aircrackgui-m4 : GUI frontend for aircrack-ng suite ( https://code.google.com/p/aircrackgui-m4/ )
b43-openfwwf : OpenBroadcom Firmware ( http://www.ing.unibs.it/openfwwf/ )
bluemaho : BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices ( http://wiki.thc.org/BlueMaho )
bt-audit : A small bluetooth audit suite ( http://www.betaversion.net/btdsd/ )
btscanner : A utility for bluetooth scanning and discovery ( http://www.pentest.co.uk/cgi-bin/viewcat.cgi?cat=downloads )
bully : A wifi-protected-setup (WPS) brute force attack tool, similar to reaver ( https://github.com/bdpurcell/bully )
cowpatty : WLAN tools for bruteforcing 802.11 WPA/WPA2 keys ( http://www.willhackforsushi.com/?page_id=50 )
crda : Central Regulatory Domain Agent for wireless networks ( http://wireless.kernel.org/en/developers/Regulatory )
desknfc : a KDE4 plasmoid which offer NFC content access ( https://github.com/nfc-tools )
grimwepa : A password cracker for both WEP and WPA-encrypted access points ( http://code.google.com/p/grimwepa/ )
horst : Small 802.11 wireless LAN analyzer ( http://br1.einfach.org/tech/horst/ )
hostapd : IEEE 802.11 wireless LAN Host AP daemon ( http://hostap.epitest.fi )
karmetasploit : KARMA + Metasploit 3 == Karmetasploit ( http://dev.metasploit.com/redmine/projects/framework/wiki/Karmetasploit )
mana-toolkit : wifi rogue AP attacks and MitM ( https://github.com/sensepost/mana )
mdk : Bruteforce hidden SSID ( http://homepages.tu-darmstadt.de/~p_larbig/wlan/ )
mfoc : Mifare Classic Offline Cracker ( https://code.google.com/p/mfoc/ )
morse2txt : Morse code decoder ( http://morse2txt.sourceforge.net/ )
n4p : Configures network automatically to perform MITM, ARP, SSLstrip, WPA Cracking, and rogue AP attacks ( https://github.com/Cyb3r-Assassin )
pixiewps : Bruteforce offline the WPS pin exploiting the low or non-existing entropy ( https://github.com/wiire/pixiewps )
reaver : Brute force attack against Wifi Protected Setup ( http://code.google.com/p/reaver-wps/ )
reaver-wps-fork-t6x : Utilise Pixie Dust Attack to find the correct WPS PIN. ( https://github.com/t6x/reaver-wps-fork-t6x )
rfidler : command line rfid interface ( https://github.com/ApertureLabsLtd/RFIDler.git )
rfidtool : command line rfid interface ( http://www.bindshell.net/tools/rfidtool )
sdrsharp : simple, intuitive, small and fast DSP application for SDR ( http://sdrsharp.com/ )
virtualradar-bin : Open-source .NET application for ads-b mapping ( http://www.virtualradarserver.co.uk/Default.aspx )
Add an ebuild in portage :
The ebuild is now in the portage tree.
You can also use layman : emerge layman then layman -a spike
For Paludis use this rsync : rsync://gentoo.zugaina.org/spike-portage
If you have a problem : ycarus(-at-)zugaina.org