1) There are 8 char lists out there, keep looking.
2) Generate one on your own. Assuming people actually follow good practices in creating/using passwords there is no such thing as an irrelevant phrase (despite what you seem to think).
3) Don't bother. Simply accept (as has been proven ad nauseum) that given sufficient time/resources/interest someone can perform this type of attack against your AP. Instead put your time and effort into securing your AP and putting some rigour around keeping it up-to-date and changing the passwords.