๏ผFormerly WireMCP, Now Focused on Offline Forensic Analysis๏ผ
English | ไธญๆ
NetForensicMCP (formerly WireMCP) is a Model Context Protocol (MCP) server designed to empower Large Language Models (LLMs) with advanced offline network traffic analysis and threat intelligence capabilities. Built on top of Wireshark's tshark, NetForensicMCP provides comprehensive PCAP analysis tools for cybersecurity professionals, threat hunters, and network forensics investigators.
- Smart Stream Analysis: Intelligent content chunking to handle large PCAP files without token overflow
- Threat Intelligence Integration: Built-in URLhaus blacklist checking with stream correlation
- Credential Extraction: Automated detection of plaintext credentials across multiple protocols
- High-Frequency IP Analysis: Proactive threat hunting through top communicator identification
get_summary_stats: Protocol hierarchy statistics for traffic composition overviewget_conversations: TCP/UDP conversation analysis with stream indexingextract_stream_content: Precise payload extraction with pagination supportget_stream_info: Content size estimation to prevent token overflowextract_stream_chunks: Automated large stream segmentationget_top_ips: High-frequency communicator identification for proactive analysischeck_threats: Batch IP threat scanning with stream correlationextract_credentials: Multi-protocol credential detection with contextcapture_packets: Legacy live traffic capture (preserved for compatibility)
NetForensicMCP transforms complex network forensics into LLM-accessible intelligence by:
- ๐ฏ Threat-Driven Analysis: Prioritizes high-risk indicators over raw data processing
- ๐ Structured Intelligence: Converts PCAP data into actionable threat intelligence
- โก Efficient Investigation: Optimized workflow prevents token exhaustion
- ๐ Correlation Engine: Links disparate network events into coherent attack narratives
- ๐ Automated Reporting: Generates comprehensive security reports with IOCs and recommendations
- ๐ต๏ธ Threat Hunting: Proactive identification of APT activities and C2 communications
- ๐ Incident Response: Rapid forensic analysis of network evidence
- ๐ Compliance Auditing: Credential leak detection and security gap identification
- ๐จ IOC Extraction: Automated indicator of compromise discovery
- ๐ Attack Reconstruction: Timeline analysis and attack path visualization
- Operating System: Windows, macOS, or Linux
- Wireshark: Download here (tshark must be in PATH)
- Node.js: v16+ recommended
- npm: For dependency management
-
Clone the repository:
git clone https://github.com/kylecui/NetForensicMCP.git cd NetForensicMCP -
Install dependencies:
npm install
-
Launch the MCP server:
node index.js
Note: NetForensicMCP auto-detects tshark or falls back to common installation paths on all platforms.
Edit mcp.json in Cursor โ Settings โ MCP:
{
"mcpServers": {
"netforensicmcp": {
"command": "node",
"args": [
"/ABSOLUTE_PATH_TO/NetForensicMCP/index.js"
]
}
}
}macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
{
"mcpServers": {
"wiremcp": {
"command": "node",
"args": ["C:\\path\\to\\NetForensicMCP\\index.js"]
}
}
}# Batch threat scanning with stream correlation
check_threats โ extract_credentials โ get_top_ips
โ
ip_reputation (parallel) โ ioc_detection โ domain_analysis
โ
extract_stream_content (targeted) โ comprehensive_report# Large PCAP investigation
get_summary_stats โ get_conversations โ get_stream_info
โ
extract_stream_chunks โ extract_stream_content (paginated)
โ
correlation_analysis โ timeline_reconstructionโ ๏ธ THREATS DETECTED (2):
๐จ 192.168.1.100 - Streams: [tcp:0, tcp:2, udp:1]
๐จ 10.0.0.50 - Streams: [tcp:5]
๐ RECOMMENDED NEXT STEPS:
1. Use threat intelligence tools to analyze these IPs
2. Extract stream content for streams containing these IPs
3. Focus investigation on: 192.168.1.100, 10.0.0.50
Content of tcp stream 0 (chars 0-15000 of 45230):
POST /api/upload HTTP/1.1
Host: suspicious-domain.com
Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9...
[TRUNCATED - More content available. Use offset=15000 to get the next chunk.]
- Intelligent Chunking: Automatic content segmentation prevents API limits
- Pagination Support: Seamless navigation through large datasets
- Size Estimation: Proactive content size assessment
- Parallel Processing: Efficient batch operations
- URLhaus Integration: Comprehensive malware URL database checking
- Stream Correlation: Links threats to specific communication flows
- IOC Extraction: Automated indicator discovery and validation
- Proactive Scanning: Top communicator threat assessment
NetForensicMCP v2.1 implements an optimized investigation workflow:
- ๐ก Reconnaissance Phase: Low-token traffic overview
- ๐ Batch Scanning Phase: Parallel threat detection
- ๐ง Intelligence Phase: Deep threat correlation
- ๐ Planning Phase: Strategic analysis targeting
- ๐ฏ Payload Phase: Precision content extraction
- ๐ Reporting Phase: Comprehensive findings synthesis
- ๐ Extended IOC Sources: Integration with VirusTotal, AlienVault OTX
- ๐ค ML-Powered Analysis: Behavioral pattern recognition
- ๐ Timeline Visualization: Interactive attack reconstruction
- ๐ Enhanced Automation: Advanced workflow automation capabilities
- ๐ฑ Web Dashboard: Browser-based analysis interface
We welcome contributions! Please see our contribution guidelines for details.
- Threat Intelligence Sources: Additional IOC providers
- Protocol Analyzers: New credential extraction methods
- Performance Optimization: Large PCAP handling improvements
- Documentation: Use cases and tutorials
- English README - Complete setup and usage guide
- ไธญๆ่ฏดๆ - ๅฎๆด็ๅฎ่ฃ ๅไฝฟ็จๆๅ
- System Prompt Example - Sample LLM prompt for effective analysis
- ็ณป็ปๆ็คบ่ฏ็คบไพ - LLM ๆๆๅๆ็็คบไพๆ็คบ่ฏ
- Contributing Guide - Development and contribution guidelines
- Changelog - Version history and updates
This project is licensed under the MIT License - see the LICENSE file for details.
See CHANGELOG.md for detailed version history and release notes.
Based on the original WireMCP project by 0xkoda with significant enhancements for offline analysis and threat intelligence integration. We extend our gratitude to the original author for providing the foundational MCP framework and live capture capabilities that made this advanced forensics platform possible.
- 0xkoda: Original WireMCP creator - thank you for the foundational live capture framework
- Wireshark Team: For the excellent tshark packet analysis engine
- Model Context Protocol Community: For the MCP framework and specifications
- URLhaus (abuse.ch): For providing comprehensive threat intelligence data
- Cybersecurity Community: For continuous feedback and improvement suggestions
โก Ready to revolutionize your network forensics? Get started with NetForensicMCP v2.1 today!