aircrack-ng|1.2rc4|Key cracker for the 802.11 WEP and WPA-PSK protocols|http://www.aircrack-ng.org
airflood|0.1|A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.|http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
airoscript|45.0a122ee|A script to simplify the use of aircrack-ng tools.|http://midnightresearch.com/projects/wicrawl/
airpwn|1.4|A tool for generic packet injection on an 802.11 network.|http://airpwn.sourceforge.net
aphopper|0.3|AP Hopper is a program that automatically hops between access points of different wireless networks.|http://aphopper.sourceforge.net/
apnbf|0.1|A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.|http://www.c0decafe.de/
hotspotter|0.4|Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.|http://www.remote-exploit.org/?page_id=418
jcrack|0.3.3beta|A utility to create dictionary files that will crack the default passwords of select wireless gateways|http://www.thedrahos.net/jcrack/
kismet|2013_03_R1b|802.11 layer2 wireless network detector, sniffer, and intrusion detection system|http://www.kismetwireless.net/
kismet-earth|0.1|Various scripts to convert kismet logs to kml file to be used in Google Earth.|https://www.blackarch.org/
kismet2earth|1.0|A set of utilities that convert from Kismet logs to Google Earth .kml format|http://code.google.com/p/kismet2earth/
lorcon|2.0.0.20091101|Generic library for injecting 802.11 frames|http://802.11ninja.net/
mana|68.56bcfcd|A toolkit for rogue access point (evilAP) attacks first presented at Defcon 22.|https://github.com/sensepost/mana
reaver|1.4|Brute force attack against Wifi Protected Setup|http://code.google.com/p/reaver-wps/
rfdump|1.6|A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible|http://www.rfdump.org
rfidiot|73.91d9f16|An open source python library for exploring RFID devices.|http://rfidiot.org/
rfidtool|0.01|A opensource tool to read / write rfid tags|http://www.bindshell.net/tools/rfidtool.html
spectools|2010_04_R1|Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version.|http://www.kismetwireless.net/spectools/
timegen|0.4|This program generates a *.wav file to "send" an own time signal to DCF77 compatible devices.|http://bastianborn.de/radio-clock-hack/
ubitack|0.3|Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go.|https://code.google.com/p/ubitack/
wavemon|0.8.0|Ncurses-based monitoring application for wireless network devices|http://eden-feed.erg.abdn.ac.uk/wavemon/
wepbuster|1.0_beta_0.7|script for automating aircrack-ng|http://code.google.com/p/wepbuster/
wi-feye|1.1|An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.|http://wi-feye.za1d.com/download.php
wifi-pumpkin|84.c8fa6fc|Framework for Rogue Wi-Fi Access Point Attack.|https://github.com/P0cL4bs/WiFi-Pumpkin
wifitap|2b16088|WiFi injection tool through tun/tap device.|https://github.com/GDSSecurity/wifitap
wireless-ids|24.b132071|Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.|https://github.com/SYWorks/wireless-ids
wirouter-keyrec|1.1.2|A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2).|http://www.salvatorefresta.net/tools/
wlan2eth|1.3|Re-writes 802.11 captures into standard Ethernet frames.|http://www.willhackforsushi.com/?page_id=79
wpa-bruteforcer|4.d5f8586|Attacking WPA/WPA encrypted access point without client.|https://github.com/SYWorks/wpa-bruteforcer
wpa2-halfhandshake-crack|27.6ed850f|A POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing the passphrase of the actual AP.|https://github.com/dxa4481/WPA2-HalfHandshake-Crack
zykeys|0.1|Demonstrates how default wireless settings are derived on some models of ZyXEL routers.|http://packetstormsecurity.com/files/119156/Zykeys-Wireless-Tool.html