SalmanFaris7/kali-penetrationtest-mcp-server
If you are the rightful owner of kali-penetrationtest-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
The Kali Pentest MCP Server is designed to provide a secure and controlled environment for educational web penetration testing using tools from Kali Linux.
Kali Pentest MCP Server
A Model Context Protocol (MCP) server that provides secure access to web penetration testing tools from Kali Linux for educational purposes.
Purpose
This MCP server provides a secure interface for AI assistants to perform basic penetration testing and vulnerability scanning on whitelisted targets in a controlled Docker environment.
⚠️ IMPORTANT LEGAL NOTICE
This server is for EDUCATIONAL PURPOSES ONLY. You must:
- Only test systems you own or have explicit written permission to test
- Comply with all applicable laws and regulations
- Never use these tools for unauthorized access or malicious purposes
- Understand that unauthorized penetration testing is illegal
Features
Current Implementation
nmap_scan
- Perform network port scanning with configurable scan typesnikto_scan
- Run web vulnerability scanner to identify common issuesdirb_scan
- Enumerate directories and files on web serverswpscan_check
- Scan WordPress sites for vulnerabilitiessqlmap_test
- Test for SQL injection vulnerabilitiessearchsploit
- Search the Exploit Database for known exploitscheck_target_whitelist
- Display currently allowed testing targetsquick_recon
- Run combined reconnaissance using multiple tools
Prerequisites
- Docker Desktop with MCP Toolkit enabled
- Docker MCP CLI plugin (
docker mcp
command) - Targets you own or have permission to test
Installation
See the step-by-step instructions provided with the files.
Usage Examples
In Claude Desktop, you can ask:
- "Scan localhost port 80 with nmap"
- "Check my local WordPress site at localhost:8080 for vulnerabilities"
- "Search for Apache exploits in the database"
- "Run a quick recon on my test server at 127.0.0.1"
- "Show me the whitelisted targets"
- "Test localhost/login.php for SQL injection"
- "Enumerate directories on my local web server"
- "Run nikto scan on my test application"