01WPA/WPA2/WPA3 handshake capture and cracking workflows
02Automated WiFi reconnaissance and network discovery mapping
030 GitHub stars
04Bluetooth device discovery and vulnerability assessment
05WPS brute-force and Pixie Dust exploitation guidance
06Evil Twin and Rogue Access Point simulation techniques