Although it doesn't have modules that directly exploit wireless vulnerabilities, Metasploit is one of the best tools to use when performing wireless penetration testing. Take for example the post-exploitation wireless modules, which can be used, among other things, to extract saved wireless LAN profiles and get the passphrases.
Metasploit and wireless
Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.