kali-mcp-server

kiddulu916/kali-mcp-server

3.2

If you are the rightful owner of kali-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.

A Model Context Protocol (MCP) server that provides secure access to penetration testing and security assessment tools through a Docker-containerized Kali Linux environment.

Tools
21
Resources
0
Prompts
0

Kali Linux MCP Server

A Model Context Protocol (MCP) server that provides secure access to penetration testing and security assessment tools through a Docker-containerized Kali Linux environment.

⚠️ CRITICAL SECURITY WARNING

This server provides access to powerful security testing tools. You MUST:

  • Only use on systems you own or have explicit written permission to test
  • Never use against production systems without authorization
  • Understand that unauthorized security testing is illegal in most jurisdictions
  • Keep this server secured and never expose it to untrusted networks
  • Use only for educational purposes and authorized security assessments

Purpose

This MCP server enables AI assistants like Claude to perform web penetration testing and security assessments in controlled, authorized environments. All tools run inside a secure Docker container with input sanitization and non-root execution.

Features

Current Implementation

  • nmap_scan - Network scanning and service detection
  • ffuf_scan - Web application fuzzing and directory discovery
  • amass_enum - Comprehensive subdomain enumeration
  • searchsploit_search - Exploit database searches
  • sublist3r_enum - Subdomain enumeration via multiple sources
  • assetfinder_scan - Asset and subdomain discovery
  • gau_links - URL discovery from archive sources
  • subfinder_scan - Fast subdomain discovery
  • httpx_probe - HTTP service probing and validation
  • nuclei_scan - Automated vulnerability scanning with templates
  • katana_crawl - Next-generation web crawling
  • dnsx_resolve - Fast DNS resolution and enumeration
  • naabu_portscan - High-speed port scanning
  • sqlmap_test - SQL injection vulnerability testing
  • nikto_scan - Web server vulnerability scanning
  • dirb_scan - Directory and file brute-forcing
  • wpscan_check - WordPress security assessment
  • netcat_connect - Network connectivity testing
  • whois_lookup - Domain registration information
  • cewl_wordlist - Custom wordlist generation from websites
  • gospider_crawl - Fast web spidering and crawling

Prerequisites

  • Docker Desktop with MCP Toolkit enabled
  • Docker MCP CLI plugin (docker mcp command)
  • Basic understanding of penetration testing concepts
  • Legal authorization for any testing performed

Installation

See the detailed step-by-step instructions in Section 2 below.

Usage Examples

In Claude Desktop, you can ask:

Reconnaissance

  • "Scan example.local with nmap to find open ports"
  • "Enumerate subdomains for testdomain.local using subfinder"
  • "Perform a WHOIS lookup on testdomain.local"
  • "Find assets related to testdomain.local"

Web Application Testing

Security Assessment

Network Analysis

  • "Use Naabu to scan ports on testserver.local"
  • "Test connectivity to testserver.local port 443 with netcat"
  • "Resolve DNS records for testdomain.local with DNSx"