JesseEikeland/kali-linux-mcp
If you are the rightful owner of kali-linux-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
The Kali Linux Security Tools MCP Server provides access to over 30 penetration testing tools from Kali Linux through Claude Desktop, designed for educational and authorized testing purposes only.
Kali Linux Security Tools MCP Server
A comprehensive MCP server providing access to 30+ Kali Linux penetration testing tools through Claude Desktop.
⚠️ LEGAL WARNING
IMPORTANT: These tools are for EDUCATIONAL PURPOSES ONLY. Only use on:
- Systems you own
- Systems you have explicit written permission to test
- Controlled lab environments
Unauthorized access, scanning, or testing of computer systems may be ILLEGAL in your jurisdiction and could result in criminal prosecution.
🛠️ Available Tools (30+ Tools)
Network Scanning
nmap_scan- Port scanning and service detectionmasscan_scan- High-speed port scanningnetdiscover_scan- Network host discovery
Web Application Testing
nikto_scan- Web server vulnerability scanningsqlmap_scan- SQL injection testingwpscan_scan- WordPress security testingdirb_scan- Directory brute forcinggobuster_scan- Fast directory/DNS brute forcingwhatweb_scan- Web technology identificationwafw00f_scan- WAF detectioncommix_scan- Command injection testing
SSL/TLS Testing
sslscan_test- SSL/TLS configuration testingtestssl_test- Comprehensive SSL/TLS testing
DNS Tools
dnsenum_scan- DNS enumerationdnsrecon_scan- DNS reconnaissancefierce_scan- DNS and subdomain enumeration
Password Cracking
john_crack- Password hash crackinghydra_crack- Login brute forcingcrunch_generate- Custom wordlist generation
Exploitation
searchsploit_search- Exploit database searchmsfconsole_search- Metasploit module search
Information Gathering
whois_lookup- Domain WHOIS informationtheharvester_search- Email and subdomain harvestingsmtp_user_enum- SMTP user enumeration
Wireless Testing
aircrack_info- Wireless interface information
System Auditing
lynis_audit- System security auditing
Forensics
exiftool_analyze- File metadata extractionbinwalk_analyze- Embedded file analysis
Utilities
netcat_connect- TCP/UDP connection testing
📋 Prerequisites
- Docker Desktop installed
- Claude Desktop installed
- At least 8GB RAM
- 20GB free disk space
🚀 Quick Start
1. Clone the Repository
cd ~/MCP/kali
git clone https://github.com/JesseEikeland/kali-linux-mcp.git .
2. Create Output Directory
mkdir output
3. Build the Docker Container
docker-compose build
This will take 10-15 minutes as it downloads Kali Linux and installs all security tools.
4. Test the Server
docker-compose up
You should see log messages indicating the server has started. Press Ctrl+C to stop.
5. Configure Claude Desktop
Edit your Claude Desktop configuration file:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Add this configuration:
{
"mcpServers": {
"kali-security-tools": {
"command": "docker",
"args": [
"compose",
"-f",
"/Users/jesse/MCP/kali/docker-compose.yml",
"run",
"--rm",
"kali-mcp-server"
]
}
}
}
Note: The path /Users/jesse/MCP/kali/docker-compose.yml is already set for your system. If you cloned to a different location, update this path.
6. Restart Claude Desktop
Completely quit and restart Claude Desktop.
7. Verify Installation
In Claude Desktop, start a new conversation and look for the 🔌 icon indicating MCP tools are available. You should see 30+ security tools available.
8. Test a Tool
Try this prompt in Claude:
Use searchsploit_search to search for "wordpress" exploits
📁 File Storage
Place files to analyze in the ./output directory. Tools like exiftool_analyze and binwalk_analyze will access files from this location.
🔒 Security Features
- Non-root execution
- Input sanitization
- Command timeout protection
- Dangerous character filtering
- IP and domain validation
- Logging for audit trails
📝 Usage Examples
Port Scanning
Use nmap_scan to scan 192.168.1.1 with scan_type "basic"
Web Vulnerability Scanning
Use nikto_scan to test http://testsite.local on port 80
SQL Injection Testing
Use sqlmap_scan to test http://testsite.local/page.php?id=1
Exploit Search
Use searchsploit_search to find exploits for "apache 2.4"
WordPress Scanning
Use wpscan_scan to scan https://example.com with enumerate "vp"
⚡ Performance Notes
- Some scans may take several minutes
- Timeout limits prevent hanging
- Network mode: host (for raw packet access)
- Requires NET_ADMIN and NET_RAW capabilities
🐛 Troubleshooting
Permission Errors
Ensure Docker has proper capabilities set in docker-compose.yml
Timeout Issues
Increase timeout values in server.py for long-running scans
Network Issues
Verify network_mode: host is set for tools requiring raw sockets
Container Won't Start
# Check logs
docker-compose logs
# Rebuild container
docker-compose build --no-cache
🔄 Updating Tools
To update the security tools database:
docker-compose run --rm kali-mcp-server sudo searchsploit -u
📚 Additional Resources
⚖️ Ethical Use
Always follow responsible disclosure practices. If you discover vulnerabilities:
- Document findings carefully
- Notify the system owner privately
- Allow reasonable time for fixes
- Do not disclose publicly without permission
🤝 Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
📄 License
For educational and authorized testing purposes only.
⚠️ Disclaimer
The authors and contributors are not responsible for misuse of these tools. Users are solely responsible for ensuring they have proper authorization before testing any systems.
🌟 Star This Repo
If you find this useful, please star the repository!