Skip to main content
Run any Skill in Manus
with one click

offensive-wps

// WPS (Wi-Fi Protected Setup) PIN attack methodology — Pixie Dust offline attack against vulnerable chipsets (Ralink, Realtek, Broadcom, MediaTek), online PIN brute-force with reaver/bully, lockout handling, time-of-day evasion, WPS push-button vulnerability windows, and PIN-to-PSK derivation. Use when a target SOHO router exposes WPS — common on consumer ISP gear, often left enabled by default even when WPS attacks have been known for over a decade.

$ git log --oneline --stat
stars:1,187
forks:206
updated:May 6, 2026 at 08:09
SKILL.md
readonly