{"id":"derv82-wifite2","name":"wifite2","homepage":null,"repo_url":"https://github.com/derv82/wifite2","category":"security","subcategories":[],"tags":["ai-ml","wifi-cracker","wifi-audit","wireless-security","penetration-testing","cli","python"],"what_it_does":"Wifite2 is a CLI Python tool that automates wireless network auditing by orchestrating external wireless attack utilities (e.g., Aircrack-ng suite tools, reaver/bully for WPS, and hashcat-related tools for PMKID). It scans for targets, captures handshakes/PMKID/WEP-related artifacts, and attempts to crack passwords using the enabled attack methods.","use_cases":["Authorized wireless security assessments to test WPA/WPA2/WPS/WEP exposure","Automating capture and cracking workflows using common external toolchains","Educational/forensic demonstrations of how common Wi-Fi attack paths work (where legally authorized)"],"not_for":["Unauthorized access or attacking networks you do not own or have explicit permission to test","Production environments or systems where running packet-injection/deauthentication is not acceptable","Use as a general-purpose API/service within automation platforms (it is an interactive local CLI)"],"best_when":"You have explicit authorization and an environment (e.g., Kali/ParrotSec) with a compatible wireless adapter supporting monitor mode and packet injection, and you want an automated wrapper around standard wireless cracking tools.","avoid_when":"You need a network API/SDK/web integration, or you cannot use monitor-mode/injection (or deauth/intrusive traffic is disallowed), or you require strong safety/guardrails for misuse.","alternatives":["Manual usage of Aircrack-ng / Reaver/Bully / Hashcat toolchains","Other Wi-Fi auditing frameworks or scripts that focus on specific capture methods (e.g., handshake/PMKID capture tools) rather than full cracking automation"],"af_score":24.2,"security_score":12.2,"reliability_score":27.5,"package_type":"skill","discovery_source":["openclaw"],"priority":"high","status":"evaluated","version_evaluated":null,"last_evaluated":"2026-03-29T14:56:26.671036+00:00","interface":{"has_rest_api":false,"has_graphql":false,"has_grpc":false,"has_mcp_server":false,"mcp_server_url":null,"has_sdk":false,"sdk_languages":[],"openapi_spec_url":null,"webhooks":false},"auth":{"methods":[],"oauth":false,"scopes":false,"notes":"No remote authentication model. Local execution uses OS privileges (e.g., sudo) and local wireless hardware access; there is no API-layer auth described."},"pricing":{"model":null,"free_tier_exists":false,"free_tier_limits":null,"paid_tiers":[],"requires_credit_card":false,"estimated_workload_costs":null,"notes":"Open-source (GPL-2.0 per repo metadata). Pricing is not applicable."},"requirements":{"requires_signup":false,"requires_credit_card":false,"domain_verification":false,"data_residency":[],"compliance":[],"min_contract":null},"agent_readiness":{"af_score":24.2,"security_score":12.2,"reliability_score":27.5,"mcp_server_quality":0.0,"documentation_accuracy":55.0,"error_message_quality":0.0,"error_message_notes":null,"auth_complexity":35.0,"rate_limit_clarity":0.0,"tls_enforcement":0.0,"auth_strength":5.0,"scope_granularity":0.0,"dependency_hygiene":20.0,"secret_handling":40.0,"security_notes":"Security-relevant risks are inherent to the tool’s purpose: it automates Wi-Fi password/WPS cracking workflows using external utilities and may involve deauthentication/replay traffic. The README does not describe safe-use guardrails, misuse prevention, or secure operational controls. Running it also depends on external binaries (Aircrack-ng suite, reaver/bully, hashcat-related tools) whose versioning/CVE posture is not assessed from the provided content. No documentation on how secrets (e.g., captured handshakes or cracked keys) are stored/permissioned is included.","uptime_documented":0.0,"version_stability":45.0,"breaking_changes_history":40.0,"error_recovery":25.0,"idempotency_support":"false","idempotency_notes":"Attacking/capture workflows are inherently stateful (radio environment, captured artifacts) and repeated runs may start new capture/crack attempts or overwrite outputs in the current directory.","pagination_style":"none","retry_guidance_documented":false,"known_agent_gotchas":["Requires privileged local execution and compatible wireless hardware (monitor mode + injection)","Relies on external third-party tools; behavior depends on their versions and system environment","Operations are intrusive (deauth/replay/etc.) and may fail depending on Wi-Fi/router protections and legal/operational constraints","No formal API contract; agents would need to drive the local CLI (including interactive selection) or parse stdout"]}}