{"id":"derv82-wifite2","name":"wifite2","af_score":24.2,"security_score":12.2,"reliability_score":27.5,"what_it_does":"Wifite2 is a CLI Python tool that automates wireless network auditing by orchestrating external wireless attack utilities (e.g., Aircrack-ng suite tools, reaver/bully for WPS, and hashcat-related tools for PMKID). It scans for targets, captures handshakes/PMKID/WEP-related artifacts, and attempts to crack passwords using the enabled attack methods.","best_when":"You have explicit authorization and an environment (e.g., Kali/ParrotSec) with a compatible wireless adapter supporting monitor mode and packet injection, and you want an automated wrapper around standard wireless cracking tools.","avoid_when":"You need a network API/SDK/web integration, or you cannot use monitor-mode/injection (or deauth/intrusive traffic is disallowed), or you require strong safety/guardrails for misuse.","last_evaluated":"2026-03-29T14:56:26.671036+00:00","has_mcp":false,"has_api":false,"auth_methods":[],"has_free_tier":false,"known_gotchas":["Requires privileged local execution and compatible wireless hardware (monitor mode + injection)","Relies on external third-party tools; behavior depends on their versions and system environment","Operations are intrusive (deauth/replay/etc.) and may fail depending on Wi-Fi/router protections and legal/operational constraints","No formal API contract; agents would need to drive the local CLI (including interactive selection) or parse stdout"],"error_quality":0.0}