Getting Started with WiFuX
A complete beginner guide — from Termux install to running your first WPS attack.
Requirements
Install WiFuX
Open Termux and run this one command. It clones the repo, installs all dependencies, and sets up the wifux command globally.
The installer creates a global wifux command in Termux's bin directory so you can run it from any folder.
Find your WiFi interface
WiFuX needs your interface name. On most Android devices it's wlan0, but it can vary.
Or use:
Look for names starting with wlan. Common: wlan0, wlan1, wlan2.
Fix root issues (if needed)
If you see "no superuser binary detected", run the built-in fix:
Removes conflicting tsu packages, installs sudo, and scans known paths for a valid su binary from Magisk or KernelSU.
Run your first scan
Just run wifux — scans nearby networks, you pick one, Pixie Dust runs automatically.
Understanding the two attack modes
Fastest method. Extracts the PIN offline from the WPS handshake in seconds. Always try this first.
Tries all ~11,000 WPS PIN combinations. Slower (hours) but works on any WPS router. Sessions are auto-saved.
Tries every visible network once per pass. Tracks attacked BSSIDs and skips them next visit.
Where results are saved
When WiFuX cracks a network, credentials are written to multiple locations automatically:
store/WiFuX_saved_data.txtHuman-readable box format with SSID, PIN, PSK, timestampreports/stored.txtPlain text log of all cracked credentialsreports/stored.csvSpreadsheet-compatible CSV format~/.WiFuX/sessions/Bruteforce session files for resume~/.WiFuX/auto_results.jsonResults from --auto modeTroubleshooting common errors
Open a root shell first.
Wrong interface name or WiFi is off.
Use --handle-rfkill flag.
Toggle WiFi off and on. Disable Android Location. Move closer.
Router is not vulnerable. Use bruteforce.
Add delay + MAC rotation.