As much as I agree with you on this, writing your own tools is not a simple task to undertake. I do think that in the name of research, I would recommend someone to use these tools to understand the attacks and how they work, and from there start writing their own code. As we all know, the aircrack suite as a whole actually takes some thought and planning to perform an attack. There are more noob friendly tools for cracking WEP...for example, the ultimate tool in click n' hack softwarez...wesside-ng.
Wesside-ng is an auto-magic tool which incorporates a number of techniques to seamlessly obtain a WEP key in minutes. It first identifies a network, then proceeds to associate with it, obtain PRGA (pseudo random generation algorithm) xor data, determine the network IP scheme, reinject ARP requests and finally determine the WEP key. All this is done without your intervention.
lol you do have a point there
But the GUIz man, teh guiz!!
http://code.google.com/p/aircrackgui-m4/lol tbh I've never used a gui for aircrack, ever since backtrack 3 beta I've used airoscript and back when I was using backtrack 2 I did it manually.
HOWEVER, my intention when I wrote up this paper (like back in 2009-2010) was to show the vulnerabilities in WEP security. The point was to show that by pressing a few numbers, anyone can hack their WEP network. Then once on their network the damage that could be done. I do believe that people should know what the commands of the aircrack suite, but honestly I havent used it by its self in so long, all it takes is for me to run airoscript.