aircrack-ng|1.2rc4|Key cracker for the 802.11 WEP and WPA-PSK protocols|http://www.aircrack-ng.org airflood|0.1|A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.|http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html airoscript|45.0a122ee|A script to simplify the use of aircrack-ng tools.|http://midnightresearch.com/projects/wicrawl/ airpwn|1.4|A tool for generic packet injection on an 802.11 network.|http://airpwn.sourceforge.net aphopper|0.3|AP Hopper is a program that automatically hops between access points of different wireless networks.|http://aphopper.sourceforge.net/ apnbf|0.1|A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.|http://www.c0decafe.de/ batctl|2016.2|B.A.T.M.A.N. advanced control and management tool|http://www.open-mesh.net/ batman-adv|2016.0|Batman kernel module, (included upstream since .38)|http://www.open-mesh.net/ batman-alfred|2016.0|Almighty Lightweight Fact Remote Exchange Daemon|http://www.open-mesh.org/ beholder|0.8.10|A wireless intrusion detection tool that looks for anomalies in a wifi environment.|http://www.beholderwireless.org/ cowpatty|4.6|Wireless WPA/WPA2 PSK handshake cracking utility|http://www.wirelessdefence.org/Contents/Files/ create_ap|206.a7fa8b5|This script creates a NATed or Bridged WiFi Access Point.|https://github.com/oblique/create_ap eapeak|115.478a781|Analysis Suite For EAP Enabled Wireless Networks.|https://github.com/securestate/eapeak freeradius|3.0.11|The premier open source RADIUS server|http://www.freeradius.org/ fuzzap|14.f13932c|A python script for obfuscating wireless networks.|https://github.com/lostincynicism/FuzzAP g72x++|1|Decoder for the g72x++ codec.|http://www.ps-auxw.de/ gerix-wifi-cracker|1.1c3cd73|A graphical user interface for aircrack-ng and pyrit.|https://github.com/TigerSecurity giskismet|20110805|A program to visually represent the Kismet data in a flexible manner.|http://www.giskismet.org gnuradio|3.7.9.2|General purpose DSP and SDR toolkit. With drivers for usrp and fcd.|http://gnuradio.org gqrx|2.5.3|Interactive SDR receiver waterfall for many devices.|http://gqrx.dk/ hoover|4.9bda860|Wireless Probe Requests Sniffer.|https://github.com/xme/hoover/ hostapd-wpe|2.2|IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator - Wireless Pwnage Edition.|https://github.com/OpenSecurityResearch/hostapd-wpe hotspotter|0.4|Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.|http://www.remote-exploit.org/?page_id=418 jcrack|0.3.3beta|A utility to create dictionary files that will crack the default passwords of select wireless gateways|http://www.thedrahos.net/jcrack/ kismet|2013_03_R1b|802.11 layer2 wireless network detector, sniffer, and intrusion detection system|http://www.kismetwireless.net/ kismet-earth|0.1|Various scripts to convert kismet logs to kml file to be used in Google Earth.|https://www.blackarch.org/ kismet2earth|1.0|A set of utilities that convert from Kismet logs to Google Earth .kml format|http://code.google.com/p/kismet2earth/ lorcon|2.0.0.20091101|Generic library for injecting 802.11 frames|http://802.11ninja.net/ mana|68.56bcfcd|A toolkit for rogue access point (evilAP) attacks first presented at Defcon 22.|https://github.com/sensepost/mana mdk3|v6|WLAN penetration tool|http://aspj.aircrack-ng.org/ mfcuk|0.3.8|MIFARE Classic Universal toolKit|http://code.google.com/p/mfcuk/ pixiewps|53.1448fff|An offline WPS bruteforce utility.|https://github.com/wiire/pixiewps reaver|1.4|Brute force attack against Wifi Protected Setup|http://code.google.com/p/reaver-wps/ rfdump|1.6|A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible|http://www.rfdump.org rfidiot|73.91d9f16|An open source python library for exploring RFID devices.|http://rfidiot.org/ rfidtool|0.01|A opensource tool to read / write rfid tags|http://www.bindshell.net/tools/rfidtool.html spectools|2010_04_R1|Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version.|http://www.kismetwireless.net/spectools/ timegen|0.4|This program generates a *.wav file to "send" an own time signal to DCF77 compatible devices.|http://bastianborn.de/radio-clock-hack/ ubitack|0.3|Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go.|https://code.google.com/p/ubitack/ waidps|16.ff8d270|Wireless Auditing, Intrusion Detection & Prevention System.|https://github.com/SYWorks/waidps wavemon|0.8.0|Ncurses-based monitoring application for wireless network devices|http://eden-feed.erg.abdn.ac.uk/wavemon/ wepbuster|1.0_beta_0.7|script for automating aircrack-ng|http://code.google.com/p/wepbuster/ wi-feye|1.1|An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.|http://wi-feye.za1d.com/download.php wifi-pumpkin|84.c8fa6fc|Framework for Rogue Wi-Fi Access Point Attack.|https://github.com/P0cL4bs/WiFi-Pumpkin wificurse|0.3.9|WiFi jamming tool.|https://github.com/oblique/wificurse wifijammer|66.abf7ea0|A python script to continuosly jam all wifi clients within range.|https://github.com/DanMcInerney/wifijammer wifiphisher|243.1761d2c|Fast automated phishing attacks against WPA networks.|https://github.com/sophron/wifiphisher wifiscanmap|106.3f45949|Another wifi mapping tool.|https://github.com/mehdilauters/wifiScanMap wifitap|2b16088|WiFi injection tool through tun/tap device.|https://github.com/GDSSecurity/wifitap wireless-ids|24.b132071|Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.|https://github.com/SYWorks/wireless-ids wirouter-keyrec|1.1.2|A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2).|http://www.salvatorefresta.net/tools/ wlan2eth|1.3|Re-writes 802.11 captures into standard Ethernet frames.|http://www.willhackforsushi.com/?page_id=79 wpa-bruteforcer|4.d5f8586|Attacking WPA/WPA encrypted access point without client.|https://github.com/SYWorks/wpa-bruteforcer wpa2-halfhandshake-crack|27.6ed850f|A POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing the passphrase of the actual AP.|https://github.com/dxa4481/WPA2-HalfHandshake-Crack zizzania|115.a063e6c|Automated DeAuth attack.|https://github.com/cyrus-and/zizzania zykeys|0.1|Demonstrates how default wireless settings are derived on some models of ZyXEL routers.|http://packetstormsecurity.com/files/119156/Zykeys-Wireless-Tool.html