WPA cracking tool for Android. Requires root.
Unlike other similar tools this app do not require monitor mode support for wireless card. This makes it able to run on any Android device.
Aircat targets the management frames used during roaming to obtain the PMKID (the unique key identifier used by the AP to keep track of the PMK being used for the client). While not all AP has support for this, many do. Aircat establish a connection to selected AP with a simple password and listens for management response frame. If response contains a PMKID it is added as a job. Providing a word list, the password can be later found by running a job.
A word list file should contain a list of passwords separated by next line (one password per line). File may be a plain text or compressed by gzip or zip. Note that a WPA password has length between 8 and 64. While this is not requirement for Aircat, removing all words less than 8 characters may slightly speed up the process.
# Remove lines that are less than 8 characters long
sed -r '/^.{,7}$/d' filename
# Remove duplicates
awk '!(count[$0]++)' filename
Aircat has a built-in password list, rockyou.txt.gz. It contains most used passwords and prepared for WPA password length.
Use Android Studio to build the project.