1. Exploit added - Java Applet Field Bytecode Verifier. Now the old faithful Java Applet has been patched, this has been described as one of the most powerful of the current exploits.
2. More deauthentication options - MDK3 and airdrop-ng added.
This may be the last update. I'm not sure I can take the script any further without overlapping with SET. Obviously I couldn't produce anything better than SET, and there seems little point in re-inventing the wheel. I also need to take some time to learn real programming and exploitation. Look out for Ruby::PwnSTAR next year!
Many thanks to all who contributed. It's been fun.