Developer Documentation
Integrate Pcap AI's intelligence into your existing security stack, AI agents, and custom workflows.
Integrate PCAP Analysis into Any Workflow
PcapAI exposes its forensics engine through two integration paths — choose the one that fits your stack.
MCP Server — for AI Agents
The MCP Server integration lets AI assistants like Claude Desktop call PcapAI's analysis tools directly during a conversation. Point the agent at a local PCAP file and ask forensic questions in plain language — the server handles deep packet inspection, threat detection, and MITRE ATT&CK mapping on your machine. No raw packet data ever leaves your environment.
REST API — for Custom Pipelines
The REST API lets you embed PCAP analysis into scripts, SIEM integrations, and backend services. Upload a capture file, poll for results, and receive structured JSON reports covering network anomalies, protocol violations, and security findings — ready to pipe into your existing ticketing or alerting systems.
What You Can Automate
Deep packet inspection and protocol analysis
Threat detection and C2 beaconing identification
MITRE ATT&CK technique mapping
Automated incident report generation
Compliance auditing for PCI-DSS, HIPAA, SOC2
Bulk PCAP processing via API pipelines