Latest Changelog v3/4/2017:
– Removed few WPS support flags.
Bully-Vanilla is a new implementation of the WPS brute force attack, written in C. It is conceptually identical to other programs, in that it exploits the (now well known) design flaw in the WPS specification. It has several advantages over the original reaver code. These include fewer dependencies, improved memory and cpu performance, correct handling of endianness, and a more robust set of options. It runs on Linux, and was specifically developed to run on embedded Linux systems (OpenWrt, etc) regardless of architecture. Bully provides several improvements in the detection and handling of anomalous scenarios. It has been tested against access points from numerous vendors, and with differing configurations, with much success.
+ Bully requires libpcap and libssl. It uses WPS functionality written by Jouni Malinen; that source code is included in this repro for simplicity, as are libcrypto and several other sources that provide needed functionality.
+ Because Bully stores randomized pins and session data in normal files, there is no need for any database functionality.
**A readonly subversion clone of this project exists at http://code.google.com/p/bully/source/checkout **
**Prebuilt binary(s) can be downloaded from google code at http://code.google.com/p/bully/downloads/list **
git clone https://github.com/wiire/bully-vanilla && cd bully-vanilla
sudo make install