Sorry for the late response, i honestly just noticed this thread.
First of all, i've used every script mentioned so far in kali. They all work.
VMR-MDK was made before aircrack changed airmon-ng. When it was wlanx <=> monx. So when kali 2 released they remade the script and included the old version of airmon inside the script. That's what the K2's for. So im assuming you're trying to feed it wlanxmon and that's y its not working. If you wanna use it, let it handle monitor mode by itself.
Rev2K is kind of a cross-your-fingers type thing. It's something to try when a router locks you out. It all depends on the router and your signal whether it'll work or not. Your literally trying to make the router reboot. Just cuz the router isn't rebooting, doesn't mean anythings broken or misconfigured. Just means that the router isn't either
Also, MTeams/Musket Teams, who made VMR-MDK also have another one that can be useful. Varmascan. It's basically meant to scan your whole area and just go to work. So you can like run it overnight while ur sleepin or whatever. It just bangs em out (or gives up) all in a row. It lets you set options like, work on crackiing an AP for 20 minutes, save the progress, and move onto the next. And ever 5 times you get all the way thru the list, rescan again. Its fully automatedhttps://github.com/L33T-H4X0R-D00D/Varmascan-reaverhttps://forums.hak5.org/index.php?/topic/34617-how-to-reaver-dropbox-raspberry-pi/
Im pretty sure both the MTeams scripts include RevDK already. Just gotta setup the configuration.
Frankenscript is easily my favorite wps script of all time. I always had the most success with it. it has a great interactive menu too for different options. Plus he didn't use airmon. That's where i learned the trick to add a virtual interface for monitor mode,(iw dev wlanx interface add monx mode monitor). Having both interfaces actually makes a difference with some AP's because it keeps them in constant communication https://forums.kali.org/showthread.php?19913-FrankenScript-by-Slim76-It-Attacks-Access-Points-and-pcap-files
I know its changed alot since i was using it. It used to have like 4 different versions of reaver. As well as wep and wpa options. So dont know wheter its still great or not
Wifite works great too.
The thing you need to remember about wps scripts, is that every single one of them is using reaver (some offer bully too) to crack the pinl. They all pretty much have something they do better than the others. But don't go crazy looking for that script that's gonna make it work all of the sudden. If you're having issue's with your router, your best bet is the reaver help menu and google. Pixie has more than 1 mode, the router brand and the chipset all come into play. There's short keys vs long keys. The default pingen's (which tend to work alot. Esp with DLink). All of these are reaver options now.
And some routers just aren't gonna open up that way. Some have better security than others, and unless you do a slow crack (like 5 minutes a day, and continue in increments), its not gonna happen
Learning reaver isn't difficult for the standard stuff. Keep in mind that scripts get made, then things change, and alot of times the dev has moved on with his/her life. Its best to just learn the tool
Another thing that makes a big difference with wps pin cracking, is how many different ways the router offers to connect with wps. Running airodump-ng with the switches -W -U -M will show the WPS method, Uptime, And Manufacturer respectively. And all can help you figure out what's best.. The -W or --wps thows whether its enabled, the version, and also the ways its configured to allow wps connections. This is actually important. The more methods it offers, the easier it is to crack. It makes a big difference. In the pic below, 1.0 is the version number. If it only offers one option, it doesnt always broadcast it, its usually PBC/Push Button in that case
USB = USB method, ETHER = Ethernet, LAB = Label, DISP = Display, EXTNFC = External NFC, INTNFC = Internal NFC, NFCINTF = NFC Interface, PBC = Push Button, KPAD = Keypad
Anyway, good luck