HomeTutorialArgumentsCommandsExamplesOutput Demo
GitHub Telegram
cd ..
Commands

Short Commands

After running the installer, these commands are available globally in Termux from any directory.

wifux

Run WiFuX with defaults — scans nearby networks and runs Pixie Dust on your selected target.

Equivalent to running: sudo python main.py -i wlan0 -K

wifux help

Open the interactive 8-section help guide inside Termux.

Covers: intro, install, interface setup, attack modes, full command list, usage examples, troubleshooting, and legal warnings. Menu-driven navigation.

wifux update

Update WiFuX to the latest version from GitHub.

Runs git pull, reinstalls requirements.txt, re-applies the wifux command setup. Safe to run at any time without losing saved sessions.

wifux fix

Fix root and superuser issues in Termux.

Removes conflicting tsu packages, installs sudo, and scans /system/bin/su, /sbin/su, Magisk paths and other known locations for a valid su binary. Prompts to open a root shell if found.

wifux contact

Open MSR's contact and social media menu.

Interactive menu with Facebook, Instagram, Telegram, GitHub, and Telegram Group links. Opens the selected platform in your Termux browser.

Saved File Locations

Where WiFuX Saves Data

Credentials and session state are written here automatically on every successful crack.

store/WiFuX_saved_data.txtHuman-readable cracked credentials (box format with SSID, PIN, PSK, timestamp)
reports/stored.txtAll cracked credentials, plain text log
reports/stored.csvAll cracked credentials, CSV format
~/.WiFuX/sessions/Bruteforce session files (.session.json, .run.json, .run) for resume
~/.WiFuX/auto_attacked.json--auto mode: history of already-attacked BSSIDs (skipped on next run)
~/.WiFuX/auto_results.json--auto mode: all crack results
~/.WiFuX/pixiewps/Pixie Dust calculated PIN data cache