MCP Server

fireshark

Rust packet analyzer with MCP server for LLM-driven security audits, Wireshark-style display filters, stream tracking, and an optional tshark backend

DevelopmentFree
#mcp-server#model-context-protocol#development#mcp#network-analysis#packet-analyzer#packet-capture#pcap#pcapng#protocol-dissector#rust

Overview

Rust packet analyzer with MCP server for LLM-driven security audits, Wireshark-style display filters, stream tracking, and an optional tshark backend Repository context: Fireshark [ ]() [ ]() [ ]() Packet analyzer built for LLMs and humans. Rust-native protocol dissection with an MCP server that lets an AI assistant perform security audits, and a color-coded CLI for direct analysis. Table of Contents - Elevator Pitch - Why native dissectors when tshark exists? - System Requirements - Features - Quick Start - Workspace Layout - MCP Server - Connecting to Claude Code - Connecting to Codex - Example LLM Workflow - Development - Phases - Design Rules - Documentation - MCP Server Reference - License Elevator Pitch Fireshark gives an LLM the same analytical toolkit a human analyst gets from Wireshark — packet queries, protocol decoding, display filters, stream tracking, stream reassembly, certificate extraction, finding escalation, and security audit heuristics — through structured MCP tool calls. For humans, it's a fast, color-coded CLI that decod Category: Development. Use cases: Coding workflows.

Installation

Visit the GitHub repository for installation instructions and setup guide.

View installation guide