Skip to content

Features

d3ext edited this page Jun 8, 2025 · 3 revisions

Some of the most notable features of this tool are the following:

  • Intuitive interface
  • Compatibility with most Linux distros (Kali, Parrot, Arch, Ubuntu, Fedora...)
  • All attacks and operations are fully automatized
  • Attacks categories: WPA/WPA2, WPS, WEP, Rogue AP and WPA3
  • Malleable settings via config file (/usr/share/wef/wef.cnf)
  • Enable/disable monitor mode automatically
  • MAC randomization (macchanger)
  • Show info about the network adapter
  • Headless mode supported (via configuration file)
  • 2.4 GHz and 5 GHz supported
  • Configurable timeout for attacks
  • Dynamic HTML reports based on the result of the attacks (stored under /usr/share/wef/reports/)
  • All temporal files are removed as well as changes are reverted on exit
  • Automated WPA/WPA2 and PMKID handshakes capture
  • Automated offline handshake cracking with multiple tools (aircrack, hashcat and JTR)
  • Online handshake cracking using WPA-SEC
  • Suitable to be used on Docker (make sure to add your external network adapter to it)
  • Evil Twin attack with multiple options
    • Optional DoS against legitimate AP
    • Check if submitted passwords are valid
    • Enterprise mode supported
    • MAC spoofing
    • Multiple languages available
  • Show the vendor of nearby access points and their clients
  • Change the regulatory domain of your network interface
  • More general features
Clone this wiki locally