Skip to content


Repository files navigation


WiFi Exploitation Framework

Coded with 💙 by D3Ext


Readme in spanish


This project started over 2021 as a personal tool to easily audit networks without writing long commands nor setting all values one by one and to automate the whole processes. This is not a professional tool, I created this project to learn and for testing purposes. After some time the repository obtained a bunch of stars so I decided to improve it. It's a fully offensive framework to audit wifi networks with different types of attacks for WPA/WPA2, WPS and WEP, automated hash cracking, and much more.

If you have any error please open an issue (if you want to write it in spanish you can do it). If you have any doubt contact me via Discord, my username is d3ext


  • Deauthentication attack
  • WIDS Confusion attack
  • Authentication attack
  • Beacon Flood attack
  • TKIP attack (Michael Shutdown Exploitation)
  • Pixie Dust attack
  • Null Pin attack
  • PIN Bruteforce attack
  • ARP Replay attack
  • HIRTE attack
  • Caffe Latte attack
  • Fake Authentication attack
  • WPA/WPA2 handshake capture attack
  • PMKID attack
  • EvilTwin attack

You have an explanation of the different attacks here on Wiki's repo


☑️ WPA/WPA2, WPS and WEP Attacks

☑️ Automatic handshake capture and cracking

☑️ Multiple templates for EvilTwin attack (different languages)

☑️ Enable/disable monitor mode and view interface info (frequencies, chipset, MAC...)

☑️ 2.4 GHz and 5 GHz supported

☑️ Informative attack logs (just done user side)

☑️ Custom wordlist selector when cracking

☑️ English and spanish supported

And much more


As root

git clone
cd WEF
bash wef

Take a look at the Wiki where I have more info about the installation


Simply execute this:

rm -rf /opt/wef \


Common usage of the framework

wef -i wlan0 # Your interface name might be different

Help panel

 __      _____ ___
 \ \    / / __| __|
  \ \/\/ /| _|| _|
   \_/\_/ |___|_|

[WEF] WiFi Exploitation Framework 1.3

[*] Interfaces:

Required parameters:
    -i, --interface)    The name of your network adapter interface in managed mode

Optional parameters:
    -h, --help)         Show this help panel
    --version)          Print the version and exit

See here for more information about how to use the tool and other related topics



  • EvilTwin attack for Enterprise networks
  • More options to crack handshakes
  • Better way to scan APs
  • Identify found devices vendors by their MAC addresses
  • Config file improved with more settings
  • General improvements
  • Test compatibility with others OS
  • Support WPA3 dictionary attack
  • MANA and KARMA attack
  • In-depth testing of implemented features
  • More general improvement






Thanks to ultrazar and ErKbModifier, they helped me a lot <3



Creator has no responsibility for any kind of:

  • Illegal use of the project.
  • Law infringement by third parties and users.
  • Malicious act, capable of causing damage to third parties, promoted by the user through this software.


This project is under MIT license

Copyright © 2024, D3Ext