letchupkt/kali-mcp
If you are the rightful owner of kali-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
Kali MCP Server is a lightweight API bridge that connects MCP Clients to a Kali Linux terminal, enabling remote command execution and AI-assisted offensive security workflows.
MCP Kali Server - Bug Hunting Arsenal
Author: LAKSHMIKANTHAN K (letchupkt)
📖 Table of Contents
- Overview
- Features
- Architecture
- Installation
- Usage Methods
- Bug Hunting Workflows
- Tool Categories
- Advanced Examples
- Troubleshooting
- Credits & License
🌟 Overview
Kali MCP Server is a revolutionary AI-powered cybersecurity platform that bridges the gap between artificial intelligence and penetration testing. This comprehensive system provides direct integration with 55+ professional security tools through multiple AI interfaces.
🔗 Repository: https://github.com/letchupkt/kali-mcp.git
🎯 What Makes This Special?
- AI-Driven Security Testing: Let AI models intelligently chain security tools for comprehensive assessments
- Multiple AI Interfaces: Support for Claude Desktop, 5ire, and direct Ollama integration
- Professional Arsenal: 25+ industry-standard tools for bug hunting and penetration testing
- Real-time Execution: Direct command execution with formatted results and analysis
- Intelligent Workflows: AI automatically suggests and executes appropriate tool combinations
🔍 Use Cases
- Bug Bounty Hunting: Automated reconnaissance and vulnerability discovery
- Penetration Testing: AI-assisted security assessments and exploitation
- CTF Challenges: Real-time problem solving with AI guidance
- Red Team Operations: Streamlined attack surface mapping and exploitation
- Security Research: Rapid prototyping and testing of security concepts
🎬 Demo Videos
Example solving web CTF challenge in RamadanCTF
https://github.com/user-attachments/assets/dc93b71d-9a4a-4ad5-8079-2c26c04e5397
Solving HTB machine "code"
https://github.com/user-attachments/assets/3ec06ff8-0bdf-4ad5-be71-2ec490b7ee27
🚀 Features
🧠 AI Integration Capabilities
- Multi-Platform Support: Claude Desktop, 5ire, Ollama, and custom MCP clients
- Natural Language Processing: Convert plain English to security tool execution
- Intelligent Parameter Extraction: Automatically parse targets, options, and configurations
- Contextual Tool Selection: AI suggests appropriate tools based on objectives
- Result Analysis: AI interprets and explains tool outputs
🛡️ Security Arsenal
- 55+ Professional Tools: Industry-standard security testing utilities
- Real-time Execution: Direct command execution with live output streaming
- Comprehensive Coverage: From reconnaissance to exploitation
- Automated Workflows: Chain multiple tools for complete assessments
- Custom Tool Integration: Easy addition of new security tools
🔧 Technical Features
- RESTful API: Clean, documented API for all tool interactions
- Health Monitoring: Real-time tool availability and status checking
- Error Handling: Graceful handling of timeouts and failures
- Logging: Comprehensive logging for audit and debugging
- Cross-Platform: Works on Linux, Windows, and macOS clients
🏗️ Architecture
┌─────────────────┐ ┌─────────────────┐ ┌─────────────────┐
│ AI Client │ │ MCP Server │ │ Kali Server │
│ │ │ │ │ │
│ • Claude │◄──►│ • Tool Mapping │◄──►│ • Tool Execution│
│ • 5ire │ │ • Parameter │ │ • Result │
│ • Ollama │ │ Processing │ │ Processing │
│ • Custom │ │ • Result │ │ • Health Check │
│ │ │ Formatting │ │ │
└─────────────────┘ └─────────────────┘ └─────────────────┘
Component Breakdown
- AI Client Layer: Interfaces with various AI models and platforms
- MCP Server Layer: Translates AI requests to tool-specific API calls
- Kali Server Layer: Executes security tools and returns formatted results
🛠️ Installation
Prerequisites
- Linux Machine (Kali Linux recommended)
- Python 3.8+
- Git
- Internet Connection (for tool downloads)
Step 1: Clone Repository
git clone https://github.com/letchupkt/kali-mcp.git
cd kali-mcp
Step 2: Install Security Tools
# Make installation script executable
chmod +x install_tools.sh
# Run comprehensive tool installation (takes 15-30 minutes)
sudo ./install_tools.sh
What gets installed:
- Go Environment: Required for modern security tools
- Subdomain Tools: subfinder, sublister, amass, assetfinder, chaos, shosubgo, github-subdomains
- DNS Tools: dnsx, shuffledns, puredns, alterx
- HTTP Tools: httpx, tlsx, katana, gospider, hakrawler
- Content Discovery: ffuf, feroxbuster, dirsearch, gobuster, dirb
- Vulnerability Scanners: nuclei, nikto, wpscan, dalfox, crlfuzz
- Port Scanners: masscan, rustscan, naabu
- URL Discovery: waybackurls, gau, gauplus
- Parameter Tools: arjun, paramspider, qsreplace
- Utility Tools: notify, interactsh, anew, unfurl, gf, mapcidr, cdncheck, asnmap, uncover
- And many more...
Step 3: Install Python Dependencies
pip3 install -r requirements.txt
Step 4: Start the Kali Server
python3 kali_server.py
Expected Output:
======================================================================
🚀 KALI LINUX API SERVER - BUG HUNTING ARSENAL
👨💻 Author: LAKSHMIKANTHAN K (letchupkt)
© 2025 LAKSHMIKANTHAN K (letchupkt)
======================================================================
INFO:__main__:Starting Kali Linux Tools API Server on port 5000
INFO:__main__:25+ Security tools ready for bug hunting and penetration testing
======================================================================
* Running on all addresses (0.0.0.0)
* Running on http://127.0.0.1:5000
* Running on http://192.168.1.100:5000
🎮 Usage Methods
Method 1: Claude Desktop Integration
Setup:
-
Edit Claude Desktop configuration:
# Windows C:\Users\USERNAME\AppData\Roaming\Claude\claude_desktop_config.json # macOS ~/Library/Application Support/Claude/claude_desktop_config.json -
Add MCP server configuration:
{ "mcpServers": { "kali_mcp": { "command": "python3", "args": [ "/absolute/path/to/mcp_server.py", "--server", "http://KALI_IP:5000" ] } } } -
Restart Claude Desktop
Usage Example:
You: "Perform comprehensive subdomain enumeration for example.com"
Claude: I'll help you enumerate subdomains for example.com using multiple tools.
[Executes subfinder_scan, sublister_scan, amass_scan, assetfinder_scan]
Results show 47 unique subdomains discovered across all tools...
Method 2: 5ire Desktop Integration
Setup:
- Open 5ire Desktop
- Navigate to MCP Settings
- Add new MCP server:
Command: python3 /absolute/path/to/mcp_server.py http://KALI_IP:5000
Method 3: Direct Ollama Integration (Recommended)
Setup:
# Install Ollama
curl -fsSL https://ollama.com/install.sh | sh
# Pull a capable model
ollama pull llama3.2
# or for better performance:
ollama pull codellama:13b
# Start the Ollama client
python3 ollama_client.py --kali-server http://KALI_IP:5000 --model llama3.2
Interactive Session:
======================================================================
🚀 KALI MCP SERVER - BUG HUNTING ARSENAL
👨💻 Author: LAKSHMIKANTHAN K (letchupkt)
© 2025 LAKSHMIKANTHAN K (letchupkt)
======================================================================
🤖 Model: llama3.2
🔗 Kali Server: http://192.168.1.100:5000
======================================================================
🎯 Bug Hunting Arsenal Ready!
📋 Type 'help' to see available tools and examples
🔧 Type 'tools' to list all available security tools
❌ Type 'exit' or 'quit' to end the session
======================================================================
🎯 You: Enumerate subdomains for example.com and check for takeovers
🔧 Executing detected tools...
⚡ Running subfinder with parameters: {'domain': 'example.com'}
🔧 **SUBFINDER Results**
==================================================
📋 **Output:**
admin.example.com api.example.com blog.example.com dev.example.com mail.example.com ...
⚡ Running subzy with parameters: {'target': 'example.com'}
🔧 **SUBZY Results**
==================================================
📋 **Output:**
[VULNERABLE] dev.example.com - GitHub Pages takeover possible [SAFE] admin.example.com - No takeover detected ...
🤖 Assistant: I've discovered 23 subdomains for example.com and found 1 potential subdomain takeover vulnerability on dev.example.com pointing to GitHub Pages. Here's what you should do next:
1. Verify the GitHub Pages takeover by checking if the repository exists
2. Probe the live subdomains with httpx for technology detection
3. Run nuclei scans on the active services
Would you like me to continue with these next steps?
🎯 Bug Hunting Workflows
Workflow 1: Complete Reconnaissance
AI Prompt:
"Perform complete reconnaissance on target.com including subdomain enumeration,
HTTP probing, content discovery, and vulnerability scanning"
Execution Flow:
-
Subdomain Discovery
subfinder -d target.comsublister -d target.comamass enum -d target.comassetfinder target.com
-
HTTP Service Probing
httpx -l subdomains.txt -title -tech-detect -status-codekatana -u target.com -depth 3
-
Content Discovery
ffuf -u https://target.com/FUZZ -w wordlist.txtferoxbuster -u https://target.comgobuster dir -u https://target.com
-
Vulnerability Scanning
nuclei -l live_urls.txt -t cves,exposuresnikto -h target.com
Workflow 2: Subdomain Takeover Hunt
AI Prompt:
"Check target.com for subdomain takeover vulnerabilities"
Execution Flow:
-
Subdomain Enumeration
- Multiple subdomain discovery tools
- Consolidate unique results
-
Takeover Detection
subzy run --targets subdomains.txtsubjack -w subdomains.txt -t 100 -timeout 30 -o results.txt
-
Verification
- Manual verification of flagged subdomains
- Service identification and exploitation assessment
Workflow 3: Web Application Security Assessment
AI Prompt:
"Test https://webapp.com for web application vulnerabilities"
Execution Flow:
-
Crawling & Spidering
katana -u https://webapp.comgospider -s https://webapp.comhakrawler -url https://webapp.com
-
Parameter Discovery
arjun -u https://webapp.comparamspider -d webapp.com
-
Vulnerability Testing
dalfox url https://webapp.com(XSS)crlfuzz -u https://webapp.com(CRLF)sqlmap -u https://webapp.com/page?id=1(SQLi)nuclei -u https://webapp.com -t web-vulnerabilities
Workflow 4: Advanced DNS & Infrastructure Mapping
AI Prompt:
"Perform comprehensive DNS enumeration and infrastructure mapping for target.com"
Execution Flow:
-
Passive Subdomain Discovery
subfinder -d target.comchaos -d target.comgithub-subdomains -d target.com
-
Active DNS Bruteforcing
shuffledns -d target.com -w wordlist.txtpuredns bruteforce wordlist.txt target.com
-
DNS Resolution & Validation
dnsx -l subdomains.txt -resp -a -cnamealterx -l subdomains.txt | dnsx
-
Infrastructure Analysis
tlsx -l subdomains.txt -san -cncdncheck -l subdomains.txtasnmap -d target.commapcidr -cidr 192.168.1.0/24
Workflow 5: Fast Port Scanning & Service Detection
AI Prompt:
"Scan target.com for open ports and identify running services"
Execution Flow:
-
Fast Port Discovery
naabu -host target.com -top-ports 1000rustscan -a target.com
-
Comprehensive Port Scan
masscan target.com -p1-65535 --rate=10000
-
Service Detection
nmap -sCV -p 80,443,8080 target.comhttpx -l ports.txt -title -tech-detect
Workflow 6: URL Discovery & Analysis
AI Prompt:
"Discover all historical URLs and endpoints for target.com"
Execution Flow:
-
Historical URL Discovery
echo "target.com" | waybackurlsecho "target.com" | gauecho "target.com" | gauplus
-
URL Parsing & Filtering
cat urls.txt | unfurl domainscat urls.txt | unfurl pathscat urls.txt | gf xss
-
Parameter Manipulation
cat urls.txt | qsreplace "FUZZ"cat urls.txt | anew unique_urls.txt
Workflow 7: Search Engine Reconnaissance
AI Prompt:
"Use search engines to discover exposed assets for target.com"
Execution Flow:
-
Multi-Engine Search
uncover -q "target.com" -e shodan,censys,fofashosubgo -d target.com -s SHODAN_KEY
-
Result Processing
cat results.txt | httpx -title -status-codecat results.txt | naabu -top-ports 100
-
Notification
echo "Scan complete!" | notify -provider slack
🛠️ Tool Categories
🔍 Reconnaissance & Subdomain Enumeration
Subfinder
- Purpose: Fast subdomain discovery using passive sources
- Usage:
subfinder -d example.com - Features: Multiple data sources, fast execution, JSON output
Sublister (Sublist3r)
- Purpose: Subdomain enumeration using OSINT techniques
- Usage:
sublist3r -d example.com - Features: Search engine enumeration, brute force capability
OWASP Amass
- Purpose: Network mapping and attack surface discovery
- Usage:
amass enum -d example.com - Features: Active/passive enumeration, DNS resolution
Assetfinder
- Purpose: Find domains and subdomains related to a given domain
- Usage:
assetfinder example.com - Features: Simple, fast, effective for basic enumeration
🎯 Subdomain Takeover Detection
Subzy
- Purpose: Check for subdomain takeover vulnerabilities
- Usage:
subzy run --targets subdomains.txt - Features: Multiple service detection, verification capabilities
Subjack
- Purpose: Subdomain takeover vulnerability scanner
- Usage:
subjack -w subdomains.txt - Features: Fast scanning, custom fingerprints
🌐 HTTP Analysis & Probing
Httpx
- Purpose: Fast HTTP toolkit for probing services
- Usage:
httpx -l subdomains.txt -title -tech-detect - Features: Technology detection, screenshot capture, custom headers
Katana
- Purpose: Next-generation web crawler
- Usage:
katana -u https://example.com -depth 3 - Features: JavaScript parsing, deep crawling, URL extraction
GoSpider
- Purpose: Fast web spider for crawling websites
- Usage:
gospider -s https://example.com - Features: Concurrent crawling, link extraction
📁 Content & Directory Discovery
Ffuf
- Purpose: Fast web fuzzer (Fuzz Faster U Fool)
- Usage:
ffuf -u https://example.com/FUZZ -w wordlist.txt - Features: Multiple fuzzing modes, filtering options, high performance
Feroxbuster
- Purpose: Fast content discovery tool
- Usage:
feroxbuster -u https://example.com - Features: Recursive scanning, wildcard detection
Dirsearch
- Purpose: Web path scanner
- Usage:
dirsearch -u https://example.com -e php,html,js - Features: Multiple extensions, threading, reporting
🛡️ Vulnerability Scanning
Nuclei
- Purpose: Fast vulnerability scanner with community templates
- Usage:
nuclei -u https://example.com -t cves,exposures - Features: Template-based scanning, community templates, high accuracy
Nikto
- Purpose: Web server scanner
- Usage:
nikto -h https://example.com - Features: Comprehensive checks, plugin system
DalFox
- Purpose: XSS scanner and parameter analysis tool
- Usage:
dalfox url https://example.com/search?q=test - Features: Advanced XSS detection, parameter analysis
🔗 Parameter & URL Discovery
Arjun
- Purpose: HTTP parameter discovery suite
- Usage:
arjun -u https://example.com - Features: Multiple methods, custom wordlists
ParamSpider
- Purpose: Parameter mining from web archives
- Usage:
paramspider -d example.com - Features: Archive mining, parameter extraction
Waybackurls
- Purpose: Fetch URLs from Wayback Machine
- Usage:
echo "example.com" | waybackurls - Features: Historical URL discovery
Gau (Get All URLs)
- Purpose: Get All URLs from multiple sources
- Usage:
echo "example.com" | gau - Features: Multiple data sources, comprehensive coverage
🔍 Port Scanning & Network Discovery
Nmap
- Purpose: Network discovery and security auditing
- Usage:
nmap -sCV target.com - Features: Service detection, OS fingerprinting, script engine
Masscan
- Purpose: High-speed port scanner
- Usage:
masscan 192.168.1.0/24 -p1-65535 --rate=1000 - Features: Extremely fast, large-scale scanning
RustScan
- Purpose: Modern fast port scanner
- Usage:
rustscan -a 192.168.1.1 - Features: Fast scanning, Nmap integration
Naabu
- Purpose: Fast port scanner written in Go
- Usage:
naabu -host example.com - Features: SYN/CONNECT scan, fast enumeration, Nmap integration
🌐 DNS Enumeration & Resolution
DNSx
- Purpose: Fast and multi-purpose DNS toolkit
- Usage:
echo "example.com" | dnsx -resp - Features: DNS resolution, wildcard filtering, multiple record types
ShuffleDNS
- Purpose: Wrapper around massdns for DNS bruteforcing
- Usage:
shuffledns -d example.com -w wordlist.txt - Features: Active bruteforce, wildcard handling, fast resolution
PureDNS
- Purpose: Fast domain resolver and subdomain bruteforcing
- Usage:
puredns bruteforce wordlist.txt example.com - Features: Accurate resolution, wildcard detection, bruteforce
Alterx
- Purpose: Fast and customizable subdomain wordlist generator
- Usage:
echo "example.com" | alterx - Features: Pattern-based generation, permutation engine
🔐 TLS/SSL & Certificate Analysis
TLSx
- Purpose: Fast TLS data grabber with support for multiple TLS probes
- Usage:
echo "example.com" | tlsx - Features: Certificate extraction, cipher enumeration, version detection
🔎 Search Engine Integration
Uncover
- Purpose: Discover exposed hosts using multiple search engines
- Usage:
uncover -q "example.com" -e shodan,censys - Features: Multi-engine support (Shodan, Censys, Fofa), API integration
Shosubgo
- Purpose: Subdomain enumeration using Shodan API
- Usage:
shosubgo -d example.com -s API_KEY - Features: Shodan integration, fast enumeration
Chaos
- Purpose: Subdomain discovery using ProjectDiscovery's Chaos dataset
- Usage:
chaos -d example.com - Features: Passive enumeration, large dataset
🔧 Utility & Helper Tools
Notify
- Purpose: Stream output to multiple platforms
- Usage:
echo "Alert!" | notify -provider slack - Features: Multiple providers (Slack, Discord, Telegram), custom webhooks
Interactsh
- Purpose: OOB interaction gathering server and client
- Usage:
interactsh-client - Features: DNS/HTTP/SMTP interactions, SSRF detection
CRLFuzz
- Purpose: Fast CRLF injection scanner
- Usage:
crlfuzz -u https://example.com - Features: CRLF detection, header injection testing
Qsreplace
- Purpose: Query string parameter replacement
- Usage:
cat urls.txt | qsreplace "FUZZ" - Features: Parameter manipulation, fuzzing preparation
Anew
- Purpose: Append unique lines to files
- Usage:
cat new.txt | anew existing.txt - Features: Deduplication, append-only mode
Unfurl
- Purpose: URL parsing and extraction
- Usage:
cat urls.txt | unfurl domains - Features: Component extraction (domains, paths, params)
🕷️ Advanced Web Crawling
Hakrawler
- Purpose: Fast web crawler for gathering URLs and JavaScript files
- Usage:
echo "https://example.com" | hakrawler - Features: JS file discovery, depth control, fast crawling
Gauplus
- Purpose: Enhanced version of gau with additional features
- Usage:
echo "example.com" | gauplus - Features: Multiple sources, filtering, enhanced output
🔍 Subdomain Discovery (Advanced)
GitHub Subdomains
- Purpose: Find subdomains from GitHub
- Usage:
github-subdomains -d example.com -t TOKEN - Features: GitHub code search, token-based auth
🌍 Network & Infrastructure
Mapcidr
- Purpose: Utility for manipulating CIDR ranges
- Usage:
echo "192.168.1.0/24" | mapcidr - Features: CIDR expansion, aggregation, filtering
CDNCheck
- Purpose: Identify CDN/WAF services
- Usage:
echo "example.com" | cdncheck - Features: CDN detection, WAF identification
ASNmap
- Purpose: ASN to CIDR lookup and enumeration
- Usage:
asnmap -a AS15169 - Features: ASN enumeration, CIDR mapping, organization lookup
📋 Complete Tool List (55+ Tools)
Reconnaissance & Enumeration (15 tools)
- Subfinder - Subdomain discovery using passive sources
- Sublister - OSINT-based subdomain enumeration
- Amass - Network mapping and attack surface discovery
- Assetfinder - Find domains and subdomains
- DNSx - Fast DNS toolkit with multiple features
- ShuffleDNS - DNS bruteforcing wrapper
- PureDNS - Fast domain resolver and bruteforcer
- Alterx - Subdomain wordlist generator
- GitHub Subdomains - Find subdomains from GitHub
- Shosubgo - Shodan-based subdomain discovery
- Chaos - ProjectDiscovery's Chaos dataset
- Uncover - Multi-engine search (Shodan, Censys, Fofa)
- ASNmap - ASN to CIDR lookup
- Mapcidr - CIDR manipulation utility
- Enum4linux - SMB/Windows enumeration
Subdomain Takeover (2 tools)
- Subzy - Subdomain takeover vulnerability scanner
- Subjack - Subdomain takeover tool
HTTP Analysis & Probing (3 tools)
- Httpx - Fast HTTP toolkit with tech detection
- TLSx - TLS/SSL certificate analysis
- CDNCheck - CDN/WAF identification
Web Crawling & Spidering (4 tools)
- Katana - Next-generation web crawler
- GoSpider - Fast web spider
- Hakrawler - Fast URL and JS file gatherer
- Waybackurls - Fetch URLs from Wayback Machine
- Gau - Get All URLs from multiple sources
- Gauplus - Enhanced version of gau
Content Discovery (5 tools)
- Ffuf - Fast web fuzzer
- Feroxbuster - Fast content discovery
- Dirsearch - Web path scanner
- Gobuster - Directory/DNS/VHost bruteforcer
- Dirb - Web content scanner
Vulnerability Scanning (4 tools)
- Nuclei - Template-based vulnerability scanner
- Nikto - Web server scanner
- DalFox - XSS scanner and parameter analyzer
- CRLFuzz - CRLF injection scanner
Parameter Discovery (3 tools)
- Arjun - HTTP parameter discovery
- ParamSpider - Parameter mining from archives
- Qsreplace - Query string parameter replacement
Port Scanning (4 tools)
- Nmap - Network discovery and security auditing
- Masscan - High-speed port scanner
- RustScan - Modern fast port scanner
- Naabu - Fast port scanner in Go
Exploitation & Testing (4 tools)
- SQLMap - SQL injection detection and exploitation
- Metasploit - Penetration testing framework
- Hydra - Network logon cracker
- John - Password cracker
Specialized Tools (5 tools)
- WPScan - WordPress security scanner
- Interactsh - OOB interaction server
- Notify - Multi-platform notification tool
- GF - Wrapper around grep for patterns
Utility Tools (5 tools)
- Anew - Append unique lines to files
- Unfurl - URL parsing and extraction
- Generic Command - Execute any shell command
🎨 Advanced Examples
Example 1: Complete Bug Bounty Reconnaissance
Scenario: You're testing target.com for a bug bounty program.
AI Conversation:
You: "I'm starting a bug bounty assessment on target.com. Perform comprehensive reconnaissance including subdomain enumeration, HTTP probing, content discovery, and vulnerability scanning. Focus on finding high-impact vulnerabilities."
AI: I'll perform a comprehensive bug bounty reconnaissance on target.com. Let me start with subdomain enumeration using multiple tools for maximum coverage.
[Executes subfinder, sublister, amass, assetfinder]
Found 127 unique subdomains. Now probing for live HTTP services...
[Executes httpx with technology detection]
Discovered 89 live HTTP services. Interesting findings:
- admin.target.com (Apache 2.4.41)
- api.target.com (Nginx 1.18.0)
- dev.target.com (GitHub Pages - potential takeover!)
Let me check for subdomain takeovers...
[Executes subzy and subjack]
🚨 CRITICAL: dev.target.com is vulnerable to subdomain takeover via GitHub Pages!
Now performing content discovery on high-value targets...
[Executes ffuf, feroxbuster on key subdomains]
Found several interesting endpoints:
- admin.target.com/backup/ (403 Forbidden)
- api.target.com/v1/users (200 OK)
- api.target.com/swagger.json (200 OK)
Running vulnerability scans...
[Executes nuclei with comprehensive templates]
🚨 HIGH: SQL injection detected on api.target.com/v1/search
🚨 MEDIUM: XSS vulnerability on blog.target.com/search
🚨 LOW: Information disclosure via server headers
Summary of findings:
1. Subdomain takeover: dev.target.com
2. SQL injection: api.target.com/v1/search
3. XSS: blog.target.com/search
4. Exposed API documentation: api.target.com/swagger.json
5. Backup directory: admin.target.com/backup/
Recommended next steps:
1. Exploit the subdomain takeover for maximum impact
2. Test the SQL injection for data extraction
3. Verify XSS exploitability
4. Analyze API documentation for additional endpoints
Example 2: CTF Web Challenge Solution
Scenario: You have a CTF web challenge at http://ctf.example.com:8080
AI Conversation:
You: "I have a CTF web challenge at http://ctf.example.com:8080. Help me find the flag by analyzing the application, finding hidden content, and testing for vulnerabilities."
AI: I'll help you solve this CTF challenge systematically. Let me start by crawling the application to understand its structure.
[Executes katana and gospider]
Application structure discovered:
- /login (login form)
- /register (registration form)
- /dashboard (requires authentication)
- /admin (403 Forbidden)
- /robots.txt (found!)
Let me check robots.txt and perform content discovery...
[Executes httpx to fetch robots.txt, then ffuf for hidden directories]
robots.txt reveals:
- /secret_backup/
- /dev_notes.txt
Content discovery found:
- /.git/ (exposed Git repository!)
- /backup.sql (database backup)
- /config.php.bak (backup config file)
🚨 CRITICAL: Exposed .git repository detected!
Let me extract the Git repository and analyze the source code...
[Executes git dumper equivalent via custom command]
Source code analysis reveals:
- SQL injection in login form (username parameter)
- Hardcoded admin credentials in config.php.bak
- Flag location: /admin/flag.txt
Let me test the SQL injection...
[Executes sqlmap]
SQL injection confirmed! Database extracted:
- Admin username: admin
- Admin password hash: 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 (SHA1 of 'password')
Now accessing admin panel with credentials admin:password...
[Executes httpx with authentication]
Successfully accessed /admin/flag.txt!
🏁 FLAG FOUND: CTF{g1t_r3p0s_4r3_d4ng3r0us_wh3n_3xp0s3d}
Solution summary:
1. Crawled application structure
2. Found exposed .git repository via content discovery
3. Extracted source code revealing vulnerabilities
4. Exploited SQL injection to extract credentials
5. Used hardcoded credentials to access admin panel
6. Retrieved flag from /admin/flag.txt
🔧 Troubleshooting
Common Installation Issues
Tool Not Found Errors
# Check if tool is installed
which subfinder
which nuclei
# Verify PATH includes Go binaries
echo $PATH | grep go
# Manually add to PATH
export PATH=$PATH:/usr/local/go/bin:$HOME/go/bin
# Make permanent
echo 'export PATH=$PATH:/usr/local/go/bin:$HOME/go/bin' >> ~/.bashrc
source ~/.bashrc
Permission Denied Errors
# Fix script permissions
chmod +x install_tools.sh
# Fix tool permissions
sudo chmod +x /usr/local/bin/subfinder
sudo chmod +x /usr/local/bin/nuclei
# Check tool ownership
ls -la /usr/local/bin/ | grep subfinder
Common Runtime Issues
Tool Execution Timeouts
# Default timeout in kali_server.py
COMMAND_TIMEOUT = 600 # 10 minutes default
# Long-running tools (nuclei, amass, masscan, nmap, ffuf, feroxbuster) get 15 minutes
# Or use additional_args for tool-specific timeouts
nuclei_scan(target="example.com", additional_args="--timeout 120")
Rate Limiting Issues
# Add delays to avoid rate limiting
subfinder_scan(domain="example.com", additional_args="--rate-limit 10")
httpx_scan(target="urls.txt", additional_args="--rate-limit 100")
Health Check and Diagnostics
Server Health Check
# Use the health endpoint
server_health()
# Expected response:
{
"status": "healthy",
"message": "Kali Linux Tools API Server is running",
"tools_status": {
"nmap": true,
"subfinder": true,
"nuclei": false, # Not installed
...
},
"all_essential_tools_available": false
}
📚 API Reference
Health Endpoint
GET /health
Response:
{
"status": "healthy",
"message": "Kali Linux Tools API Server is running",
"tools_status": {
"nmap": true,
"subfinder": true,
"nuclei": true
},
"all_essential_tools_available": true
}
Tool Execution Endpoints
Subdomain Enumeration
POST /api/tools/subfinder
Content-Type: application/json
{
"domain": "example.com",
"additional_args": "-sources censys,shodan"
}
Vulnerability Scanning
POST /api/tools/nuclei
Content-Type: application/json
{
"target": "https://example.com",
"templates": "cves,exposures",
"additional_args": "-severity critical,high"
}
📝 Credits & License
Author Information
Author: LAKSHMIKANTHAN K (letchupkt)
Enhanced Version: Bug Hunting Arsenal Integration
© 2025 LAKSHMIKANTHAN K (letchupkt)
Acknowledgments
- Original MCP Framework: Anthropic and the MCP community
- Security Tools: Individual tool developers and maintainers
- Inspiration: Various open-source security projects and researchers
- Testing: Bug bounty community and ethical hackers
License
This project is released under the MIT License. See LICENSE file for details.
⚠️ Legal Disclaimer
Important Notice
This project is intended solely for educational and ethical testing purposes. Any misuse of the information or tools provided — including unauthorized access, exploitation, or malicious activity — is strictly prohibited.
Responsible Use
- ✅ Only test systems you own or have explicit written permission to test
- ✅ Respect scope limitations defined in testing agreements
- ✅ Follow responsible disclosure for any vulnerabilities found
- ✅ Comply with local laws and regulations regarding security testing
- ✅ Use appropriate rate limiting to avoid service disruption
Liability
The author assumes no responsibility for misuse of this software. Users are solely responsible for ensuring their activities comply with applicable laws and regulations.
Always ensure you have proper authorization before testing any systems.
Happy Bug Hunting! 🎯
Remember: With great power comes great responsibility. Use these tools ethically and legally.
© 2025 LAKSHMIKANTHAN K (letchupkt) - MCP Kali Server
📞 Support and Contact
🔗 GitHub Repository
- Main Repository: https://github.com/letchupkt/kali-mcp
- Issues & Bug Reports: https://github.com/letchupkt/kali-mcp/issues
- Feature Requests: https://github.com/letchupkt/kali-mcp/issues/new
- Discussions: https://github.com/letchupkt/kali-mcp/discussions
🤝 Getting Help
- GitHub Issues: Report bugs or request features at https://github.com/letchupkt/kali-mcp/issues
- Documentation: Check this comprehensive README and inline code comments
- Community: Join security-focused Discord servers and forums
- Email: Contact LAKSHMIKANTHAN K (letchupkt) for direct support
🚀 Feature Requests
Have ideas for new tools or improvements? We'd love to hear them!
- Check existing issues: https://github.com/letchupkt/kali-mcp/issues
- Provide detailed use cases and requirements
- Consider contributing the implementation
🤝 Contributing
Contributions are welcome! Please:
- Fork the repository: https://github.com/letchupkt/kali-mcp
- Create a feature branch:
git checkout -b feature/amazing-feature - Commit your changes:
git commit -m 'Add amazing feature' - Push to the branch:
git push origin feature/amazing-feature - Submit a pull request with detailed description
- Ensure all tests pass and tools are properly integrated
🐛 Security Issues
Found a security vulnerability in the tool itself?
- DO NOT open a public issue
- Contact LAKSHMIKANTHAN K (letchupkt) directly for responsible disclosure
- Provide detailed reproduction steps and impact assessment
📊 Project Stats
- 55+ Security Tools integrated
- 3 AI Interface Methods supported
- Cross-Platform compatibility
- Active Development and maintenance
🌟 Star History
If you find this project useful, please consider giving it a star on GitHub!
🔄 Updates and Roadmap
Recent Updates
- ✅ MCP server with 55+ security tools
- ✅ Added 30+ new tools including DNSx, Naabu, TLSx, Uncover, and more
- ✅ Direct Ollama integration
- ✅ Comprehensive documentation
- ✅ Automated installation script
- ✅ Advanced workflow examples
Upcoming Features
- 🔄 Web-based dashboard interface
- 🔄 Docker containerization
- 🔄 Additional AI model integrations
- 🔄 Real-time collaboration features
- 🔄 Advanced reporting and analytics
Version History
- v2.0.0 - Enhanced Bug Hunting Arsenal (Current)
- v1.0.0 - Initial MCP Kali Server release
🎯 Happy Bug Hunting!
Remember: With great power comes great responsibility. Use these tools ethically and legally.
🔗 Repository: https://github.com/letchupkt/kali-mcp
👨💻 Author: LAKSHMIKANTHAN K (letchupkt)
© 2024 LAKSHMIKANTHAN K (letchupkt) - MCP Kali Server