WPA/WPA2, WEP, and WPS attacks from reconnaissance to cracking in one command. Smart target selection, GPU acceleration, session recovery.
pip install autowifi
click to copy
From interface setup to cracked keys. Every step automated, every result logged.
WEP (ARP replay, fragmentation, chopchop), WPA/WPA2 (handshake, PMKID), and WPS (pixie dust, PIN brute force) - all from one tool.
Auto-recommends the best attack vector based on encryption type, signal strength, WPS status, and client activity.
Real-time network discovery with signal strength visualization, client enumeration, and channel hopping across 2.4 GHz and 5 GHz bands.
Three cracking backends: aircrack-ng (CPU), hashcat (GPU-accelerated), and John the Ripper. Automatic wordlist detection.
Save, restore, and resume attack sessions. Never lose progress - pick up exactly where you left off after interruptions.
13-tool Model Context Protocol server. Let AI agents run wireless assessments - scan networks, capture handshakes, crack keys autonomously.
Covers WEP, WPA/WPA2, and WPS with multiple techniques per encryption type.
| Attack | Encryption | Method |
|---|---|---|
| ARP Replay | WEP | IV collection via ARP request replay |
| Fragmentation | WEP | Keystream recovery through fragmentation |
| ChopChop | WEP | KoreK chopchop keystream extraction |
| Handshake Capture | WPA/WPA2 | Deauth + 4-way handshake capture |
| PMKID | WPA/WPA2 | Clientless key extraction from AP |
| Pixie Dust | WPS | Offline WPS PIN recovery via pixie dust |
| PIN Brute Force | WPS | Online WPS PIN enumeration |
Let Claude, Cursor, or any MCP-compatible agent run wireless assessments autonomously with 13 built-in tools.
AutoWIFI ships a built-in Model Context Protocol server. Add it to your AI editor and your agent can scan networks, capture handshakes, crack keys, and generate reports - zero human interaction required.
{
"mcpServers": {
"autowifi": {
"command": "autowifi-mcp"
}
}
}
| Tool | Description |
|---|---|
| list_interfaces | List wireless interfaces |
| enable_monitor | Enable monitor mode |
| disable_monitor | Disable monitor mode |
| scan_networks | Discover nearby networks |
| get_recommended_attacks | Get best attack vectors |
| capture_handshake | Capture WPA handshake |
| capture_pmkid | Capture PMKID hash |
| wps_pixie_dust | Run pixie dust attack |
| deauth | Deauthenticate clients |
| crack_handshake | Crack captured handshake |
| verify_handshake | Verify handshake file |
| find_wordlists | Locate wordlist files |
| check_dependencies | Verify tool dependencies |
Scan, capture, and crack - each step is a single command with sensible defaults.
sudo autowifi scan -i wlan0monsudo autowifi scan -i wlan0mon -d 60sudo autowifi scan -i wlan0mon --band 5sudo autowifi capture -i wlan0mon -b AA:BB:CC:DD:EE:FFsudo autowifi pmkid -i wlan0mon -b AA:BB:CC:DD:EE:FFsudo autowifi deauth -i wlan0mon -b AA:BB:CC:DD:EE:FFautowifi crack -f capture.cap -w rockyou.txtautowifi crack -f capture.cap --backend hashcatautowifi crack -f pmkid.22000 --backend hashcatsudo autowifi monitor enable -i wlan0sudo autowifi monitor disable -i wlan0monautowifi session listautowifi session restore abc123Install AutoWIFI and go from zero to cracked keys in minutes.