βairgraph-ng is a tool to create a graph ouf of the txt file created by airodump with its -w option. The graph shows the relationships between the clients and the access points.
βairgeddon - a menu driven 3rd party tools wrapper to audit wireless networks with many features.
βbully - Bully is a new implementation of the WPS brute force attack, written in C. It is conceptually identical to other programs, in that it exploits the (now well known) design flaw in the WPS specification.
βcowpatty - If you are auditing WPA-PSK or WPA2-PSK networks, you can use this tool to identify weak passphrases that were used to generate the PMK.
βeaphammer - This package contains a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks
βkismet Kismet is a wireless network and device detector, sniffer, wardriving tool, and WIDS (wireless intrusion detection) framework.
βmdk4 - A Wi-Fi testing tool from E7mer, ASPj of k2wrlz, it uses the osdep library from the aircrack-ng project to inject frames on several operating systems.
βc41n - Automated rogue access point setup tool.
βbluelog - Bluelog is a Bluetooth scanner designed to tell you how many discoverable devices there are in an area as quickly as possible. It is intended to be used as a site survey tool, identifying the number of possible Bluetooth targets there are in the surrounding environment.
βblueranger - Use the Bluetooth interface to scan for the specified remote address.
βbluez - This package contains tools and system daemons for using Bluetooth devices. BlueZ is the official Linux Bluetooth protocol stack.
βbtscanner - btscanner is a tool designed specifically to extract as much information as possible from a Bluetooth device without the requirement to pair.
βcrackle - crackle exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK and other data collected from the pairing process, the STK (Short Term Key) and later the LTK (Long Term Key) can be collected.
βredfang - a small proof-of-concept application to find non discoveredable bluetooth devices. This is done by brute forcing the last six (6) bytes of the bluetooth address of the device and doing a read_remote_name().
βspooftooph - Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address.