wifi-whiz-mcp

LYFTIUM-INC/wifi-whiz-mcp

3.2

If you are the rightful owner of wifi-whiz-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

WiFi Whiz MCP is a professional Model Context Protocol server designed for wireless security testing and penetration testing workflows.

Tools
3
Resources
0
Prompts
0

WiFi Whiz MCP

Professional Model Context Protocol (MCP) server for wireless security testing and penetration testing workflows.

Overview

WiFi Whiz MCP provides 18 production-ready wireless security tools through Claude's MCP interface, enabling seamless integration of wireless testing capabilities into AI-powered security workflows. Built for security professionals, penetration testers, and researchers.

Features

  • 18 Wireless Security Tools across 3 major suites
  • Production-Ready Implementation with comprehensive error handling
  • Automated Installation for Ubuntu 24.04
  • Professional Documentation with security best practices
  • MCP Integration for Claude Code and Claude Desktop

Quick Start

  1. Install Dependencies

    chmod +x install-*.sh
    ./install-wireless-tools.sh
    
  2. Configure MCP Server

    cd wireless-security-mcp
    npm install
    npm run build
    
  3. Add to Claude Configuration

    {
      "mcpServers": {
        "wireless-security-mcp": {
          "command": "node",
          "args": ["./wireless-security-mcp/dist/index.js"],
          "cwd": "/path/to/wifi-whiz-mcp"
        }
      }
    }
    

Available Tools

Aircrack-ng Suite (6 Tools)

Tool NameDescriptionKey Parameters
aircrack_scan_networksScan for wireless networks using airodump-nginterface, timeout
aircrack_capture_handshakeCapture WPA/WPA2 handshakes for specific networkinterface, bssid, channel, timeout
aircrack_crack_passwordCrack captured handshakes using dictionary attackhandshakeFile, wordlist, bssid
aircrack_test_injectionTest packet injection capabilitiesinterface
aircrack_deauth_clientDeauthenticate clients from access pointinterface, bssid, clientMac, count
aircrack_monitor_modeEnable/disable monitor mode on interfaceinterface, enable

Kismet Suite (6 Tools)

Tool NameDescriptionKey Parameters
kismet_start_serverStart Kismet server for wireless monitoringinterface, port, logDir
kismet_scan_networksScan and enumerate wireless networkstimeout, interface
kismet_monitor_channelMonitor specific wireless channelinterface, channel
kismet_detect_clientsDetect and list connected clientsbssid, timeout
kismet_export_dataExport captured data in various formatsoutputFile, format
kismet_gps_trackingEnable GPS-based network mappingenable, device

Wifite Suite (6 Tools)

Tool NameDescriptionKey Parameters
wifite_auto_auditAutomated wireless network auditinginterface, timeout, minimumPower
wifite_target_networkTarget specific network for testinginterface, bssid, attackMode, timeout
wifite_wps_attackPerform WPS PIN attackinterface, bssid, timeout, pixieDust
wifite_capture_pmkidCapture PMKID for clientless attackinterface, bssid, timeout
wifite_crack_handshakeAutomated handshake crackinghandshakeFile, wordlist, bssid
wifite_session_managementSave, resume, or list Wifite sessionsaction, sessionName

Tool Categories

  • šŸ” Network Discovery: aircrack_scan_networks, kismet_scan_networks, kismet_monitor_channel
  • šŸ“” Traffic Capture: aircrack_capture_handshake, wifite_capture_pmkid, kismet_export_data
  • šŸ”“ Password Attacks: aircrack_crack_password, wifite_crack_handshake, wifite_wps_attack
  • ⚔ Active Attacks: aircrack_deauth_client, wifite_target_network, wifite_auto_audit
  • āš™ļø System Management: aircrack_monitor_mode, kismet_start_server, wifite_session_management
  • šŸ‘„ Client Analysis: kismet_detect_clients, GPS tracking with kismet_gps_tracking

System Requirements

  • Operating System: Ubuntu 24.04 LTS (recommended)
  • Wireless Interface: Monitor mode capable wireless adapter
  • Dependencies: Node.js 18+, wireless-tools, aircrack-ng, kismet, wifite
  • Permissions: Sudo access for wireless operations

Security & Legal Notice

āš ļø IMPORTANT: These tools are designed for:

  • Authorized penetration testing
  • Security research on owned networks
  • Educational purposes

Legal compliance is the user's responsibility. Ensure proper authorization before testing any wireless networks.

Installation

Automated Installation (Ubuntu 24.04)

# Install all wireless security tools
./install-wireless-tools.sh

# Install Kismet (if needed separately)
./install-kismet-ubuntu-24.04.sh

# Setup capabilities (alternative to sudo)
cd wireless-security-mcp
./setup-capabilities.sh

Manual Installation

See detailed installation guides in wireless-security-mcp/INSTALL.md.

Configuration

Basic MCP Configuration

{
  "mcpServers": {
    "wireless-security-mcp": {
      "command": "node",
      "args": ["./wireless-security-mcp/dist/index.js"],
      "cwd": "/path/to/wifi-whiz-mcp"
    }
  }
}

Advanced Configuration

See wireless-security-mcp/README.md for detailed configuration options.

Usage Examples

Basic Network Scan

Use aircrack_scan_networks with interface "wlan0mon" for 60 seconds

Capture Handshake

Use aircrack_capture_handshake on interface "wlan0mon" targeting BSSID "AA:BB:CC:DD:EE:FF" on channel 6

Automated Security Audit

Use wifite_auto_audit on interface "wlan0" with 300 second timeout and minimum power -60

Project Structure

wifi-whiz-mcp/
ā”œā”€ā”€ README.md                          # This file
ā”œā”€ā”€ WIRELESS_SECURITY_CAPABILITY_REPORT.md
ā”œā”€ā”€ CLAUDE.md                          # Project configuration
ā”œā”€ā”€ .mcp.json                          # MCP server configuration
ā”œā”€ā”€ install-*.sh                      # Installation scripts
└── wireless-security-mcp/            # MCP server implementation
    ā”œā”€ā”€ src/                          # TypeScript source code
    ā”œā”€ā”€ package.json                  # Node.js dependencies
    ā”œā”€ā”€ README.md                     # Detailed technical docs
    └── setup-capabilities.sh         # Permission setup

Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Follow existing code style and conventions
  4. Add comprehensive tests for new tools
  5. Update documentation
  6. Submit a pull request

License

This project is licensed under the MIT License - see the wireless-security-mcp/LICENSE file for details.

Support

  • Documentation: Check wireless-security-mcp/README.md for detailed technical information
  • Installation Issues: See installation scripts and INSTALL.md
  • Security Questions: Review capability report and security documentation

Professional wireless security testing through MCP integration.