MCP Server
fireshark
Rust packet analyzer with MCP server for LLM-driven security audits, Wireshark-style display filters, stream tracking, and an optional tshark backend
DevelopmentFree
#mcp-server#model-context-protocol#development#mcp#network-analysis#packet-analyzer#packet-capture#pcap#pcapng#protocol-dissector#rust
Overview
Rust packet analyzer with MCP server for LLM-driven security audits, Wireshark-style display filters, stream tracking, and an optional tshark backend
Repository context: Fireshark
[ ]()
[ ]()
[ ]()
Packet analyzer built for LLMs and humans. Rust-native protocol dissection with an MCP server that lets an AI assistant perform security audits, and a color-coded CLI for direct analysis.
Table of Contents
- Elevator Pitch
- Why native dissectors when tshark exists?
- System Requirements
- Features
- Quick Start
- Workspace Layout
- MCP Server
- Connecting to Claude Code
- Connecting to Codex
- Example LLM Workflow
- Development
- Phases
- Design Rules
- Documentation
- MCP Server Reference
- License
Elevator Pitch
Fireshark gives an LLM the same analytical toolkit a human analyst gets from Wireshark — packet queries, protocol decoding, display filters, stream tracking, stream reassembly, certificate extraction, finding escalation, and security audit heuristics — through structured MCP tool calls. For humans, it's a fast, color-coded CLI that decod
Category: Development.
Use cases: Coding workflows.
Installation
Visit the GitHub repository for installation instructions and setup guide.
View installation guide