Short Commands
After running the installer, these commands are available globally in Termux from any directory.
wifuxRun WiFuX with defaults — scans nearby networks and runs Pixie Dust on your selected target.
Equivalent to running: sudo python main.py -i wlan0 -K
wifux helpOpen the interactive 8-section help guide inside Termux.
Covers: intro, install, interface setup, attack modes, full command list, usage examples, troubleshooting, and legal warnings. Menu-driven navigation.
wifux updateUpdate WiFuX to the latest version from GitHub.
Runs git pull, reinstalls requirements.txt, re-applies the wifux command setup. Safe to run at any time without losing saved sessions.
wifux fixFix root and superuser issues in Termux.
Removes conflicting tsu packages, installs sudo, and scans /system/bin/su, /sbin/su, Magisk paths and other known locations for a valid su binary. Prompts to open a root shell if found.
wifux contactOpen MSR's contact and social media menu.
Interactive menu with Facebook, Instagram, Telegram, GitHub, and Telegram Group links. Opens the selected platform in your Termux browser.
Where WiFuX Saves Data
Credentials and session state are written here automatically on every successful crack.
store/WiFuX_saved_data.txtHuman-readable cracked credentials (box format with SSID, PIN, PSK, timestamp)reports/stored.txtAll cracked credentials, plain text logreports/stored.csvAll cracked credentials, CSV format~/.WiFuX/sessions/Bruteforce session files (.session.json, .run.json, .run) for resume~/.WiFuX/auto_attacked.json--auto mode: history of already-attacked BSSIDs (skipped on next run)~/.WiFuX/auto_results.json--auto mode: all crack results~/.WiFuX/pixiewps/Pixie Dust calculated PIN data cache