Application notes collect many small topics about using openwifi in different scenarios/modes. - [Use openwifi on the w-iLab.t testbed remotely](https://doc.ilabt.imec.be/ilabt/wilab/tutorials/openwifi.html) - [Communication between two SDR boards under AP and client mode](ap-client-two-sdr.md) - [Communication between two SDR boards under ad-hoc mode](ad-hoc-two-sdr.md) - [From CSI (Channel State Information) to CSI (Chip State Information)](csi.md) - [WiFi CSI radar via self CSI capturing](radar-self-csi.md) - [Capture IQ sample, AGC gain, RSSI with many types of trigger condition](iq.md) - [Capture dual antenna TX/RX IQ for multi-purpose (capture collision)](iq_2ant.md) - [WiFi packet, CSI and IQ sample self loopback test (over-the-air and FPGA internal)](packet-iq-self-loopback-test.md) - [IEEE 802.11n (Wi-Fi 4)](ieee80211n.md) - [802.11 packet injection and fuzzing](inject_80211.md) - [CSI fuzzer](csi_fuzzer.md) - [Access counter/statistics in FPGA](perf_counter.md) - [Access counter/statistics in driver](driver_stat.md) - [Frequent/usual trick on controlling Gain/Att/Frequency/CCA/LBT/CSMA/CW/Sensitivity/etc](frequent_trick.md) - [Driver and FPGA dynamic reloading](drv_fpga_dynamic_loading.md) - [owfuzz: a WiFi protocol fuzzing tool using openwifi.](https://github.com/alipay/WiFi-Protocol-Fuzzing-Tool) [[**Vulnerabilities**]](https://github.com/alipay/Owfuzz#discovered-vulnerabilities) - [Build FPGA with High-Level Synthesis modules](hls.md)