All Arguments
Every flag WiFuX accepts — organized by category. Search or filter to find what you need.
-i, --interface<wlan0>WiFi interface name. Always required. Usually wlan0 on Android.
-b, --bssid<MAC>Target router MAC address. If omitted, WiFuX scans and lets you pick.
-p, --pin<PIN>Try a specific WPS PIN manually instead of automated attack.
-K, --pixie-dustPixie Dust. Fast offline PIN extraction from WPS handshake. Try this first.
-F, --pixie-forcePixie Dust full range. Tries broader nonce range for partially patched routers.
-B, --bruteforceSmart Bruteforce. Tries all WPS PINs with session saving. Works on any WPS router.
--pbcPush Button Connect mode. Authenticates when WPS button on router is pressed.
--autoOne-Pass Area Scanner. Tries every visible network once, skips attacked BSSIDs.
-X, --show-pixie-cmdPrint the exact pixiewps command being executed.
-d, --delay<sec>Delay in seconds between each WPS attempt. Reduces lockout risk.
-t, --timeout<sec>WPS response timeout. Default: 10s. Increase for slow or distant routers.
-T, --m57-timeout<sec>M5/M7 message timeout. Default: 0.40s. Increase for slow APs.
--lock-delay<sec>Wait time after router WPS lock. Default: 60s.
--fail-wait<sec>Pause duration after 10 consecutive failures.
--recurring-delay<X:Y>Pause Y seconds every X attempts. Format: 10:5 = pause 5s every 10 tries.
--auto-timeout<sec>Pixie Dust timeout per network in --auto mode. Default: 30s.
--auto-pin-timeout<sec>PIN attempt timeout per network in --auto mode. Default: 15s.
-g, --max-attempts<n>Maximum PIN attempts. 0 = unlimited.
-L, --ignore-locksIgnore router WPS lock and keep attacking.
-M, --mac-changerRotate MAC address on every attempt.
--resume-session<BSSID>Resume a saved bruteforce session from its last PIN mask.
--list-sessionsShow all saved sessions with BSSID and progress.
--auto-resetClear --auto mode attack history.
--html-reportGenerate HTML report after the session.
--report-format<fmt>Report format: html, txt, csv, or json.
--detailed-reportInclude signal, channel and source in the report.
--json-output<file>Append cracked result to a JSON file.
--csv-output<file>Append cracked result to a CSV file.
--log-file<file>Write all activity to a log file.
--write-legacyAlso save in legacy stored.txt / stored.csv format.
--signal-analysisRun 5 scans for avg/min/max signal per AP before attacking.
--detect-weak-algoHighlight routers with weak WPS chipsets (Realtek, Broadcom, Atheros, MediaTek).
--check-vulnShow full vulnerability report for target before attacking.
--auto-vuln-listAutomatically add cracked BSSIDs to the vulnerability list.
-r, --reverse-scanShow scanned network list in reverse order.
--pixie-listPrint all router models in the Pixie Dust vulnerability database.
--list-all-modelsPrint all vendor and model entries in the router database.
--pin-algo<algo>Use a specific WPS PIN generation algorithm.
--dtsDon't touch Android WiFi settings. Manage interface directly.
--handle-rfkillAuto-unblock WiFi if rfkill is blocking the interface.
--mtk-wifiEnable MediaTek wmtWifi driver for MTK-based Android devices.
--iface-downBring interface down after the session ends.
-v, --verboseShow detailed debug output — every packet and handshake step.
-l, --loopLoop mode — restart network scan automatically after finishing.
--no-colorsDisable ANSI colors — for piping to a log file.
-h, --helpShow help message and exit.