WEPCrack is an open source tool for breaking 802.11 WEP secret keys. This tool is is an implementation of the attack described by Fluhrer, Mantin, and Shamir in the paper "Weaknesses in the Key Scheduling Algorithm of RC4"
While Airsnort has captured the media attention, WEPCrack was the first publicly available code that demonstrated the above attack. We released code and announced to bugtraq on Aug 12, 2001. Airsnort released code about a week later, but had a much more useable and complete implementation for both collection and cracking. Adam Stubblefield and AT&T had the first publicly announced verification of the attack, but did not release their source code for public review and use.