Introduction • Attacks • Features • Installation • Usage
This tool is designed for security researchers and penetration testers to analyze and exploit vulnerabilities in Wi-Fi networks. It provides an intuitive interface with a wide range of automated and manual attack techniques to test WPA/WPA2, WPS, and WEP security. With support for both 2.4 GHz and 5 GHz networks, detailed logging and customizable attack options, it offers flexibility for different testing scenarios. This is not a professional tool.
If you find an error, please open an issue (you can write it in english or spanish, as you want).
- DoS (optional handshake capture):
- Deauthentication attack
- WIDS Confusion attack
- Authentication attack
- Beacon Flood attack
- TKIP attack (Michael Shutdown Exploitation)
- WPS:
- Pixie Dust attack
- PIN Bruteforce attack
- Null Pin attack
- WEP:
- ARP Replay attack
- HIRTE attack
- Caffe Latte attack
- Fake Authentication attack
- Handshake:
- WPA handshake capture (without deauth)
- PMKID attack (clientless)
- Pwnagotchi mode
- Rogue AP:
- Evil Twin attack
- BSSID spoofing
- Karma mode
- Enterprise WPA supported
- Deauth supported
- Evil Twin attack
- Other attacks:
- Automatic attack mode (Auto PWN)
- WPA3 dictionary attack
All the mentioned attacks/techniques are explained here on the Wiki
This are some of the most notable features:
☑️ WPA/WPA2, WPS, WEP, Rogue-AP, and Handshake Attacks
☑️ Automatic attack mode based on the features of the AP
☑️ Automatic handshake capture
☑️ Online and offline handshake cracking
☑️ Simple login template for Evil Twin attack (different languages)
☑️ Enable/disable monitor mode and view information about the network interface (frequencies, chipset, MAC...)
☑️ 2.4 GHz and 5 GHz supported
☑️ Informative reports using HTML templates
☑️ English and spanish supported
As root
git clone https://github.com/D3Ext/WEF
cd WEF
bash wef
Take a look at the Wiki where I have more info about the installation
Simply execute this:
rm -rf /usr/share/wef \
/usr/bin/wef
Common usage of the framework (your interface may have other name)
wef -i wlan0
Help panel
__ _____ ___
\ \ / / __| __|
\ \/\/ /| _|| _|
\_/\_/ |___|_|
[WEF] WiFi Exploitation Framework 1.5
[*] Interfaces:
wlan0
ens33
Required parameters:
-i, --interface) The name of your network adapter interface in managed mode
Optional parameters:
-h, --help) Show this help panel
--version) Print the version and exit
See here for more information about how to use the tool and other related topics
Online cracking (WPA-SEC)WPA3 dictionary attackEnhanced reports using HTMLModify regulatory domain to change txpowerMore languages added as Evil Twin templatesRandomize MAC address automatically during launchGeneral improvement and minor fixesBugs fixedAuto-exploit modeAPs scan now shows if WPS is enabled without washPath autocompletion supportedBetter output loggingBetter code readability (code optimized)Add vendor logo to Evil Twin templates on the flyMAC vendors have been updated and optimized using official OUI list- Test compatibility with others OS
In-depth testing of implemented features
See CONTRIBUTING.md
See CHANGELOG.md
Thanks to ultrazar and ErKbModifier
https://github.com/aircrack-ng/aircrack-ng
https://github.com/aircrack-ng/mdk4
https://github.com/v1s1t0r1sh3r3/airgeddon
https://github.com/FluxionNetwork/fluxion
https://github.com/P0cL4bs/wifipumpkin3
https://github.com/s0lst1c3/eaphammer
https://github.com/derv82/wifite2
https://github.com/wifiphisher/wifiphisher
https://github.com/ZerBea/hcxtools
https://github.com/ZerBea/hcxdumptool
https://github.com/Tylous/SniffAir
https://github.com/blunderbuss-wctf/wacker
https://github.com/evilsocket/pwnagotchi
https://github.com/koutto/pi-pwnbox-rogueap
https://github.com/koutto/pi-pwnbox-rogueap/wiki/01.-WiFi-Basics
The creator has no responsibility for any kind of illegal use of the project.
This project is under MIT license
Copyright © 2025, D3Ext