SamTesura/claude-security-tools
If you are the rightful owner of claude-security-tools and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
The Claude Security Tools project integrates professional security testing tools with Claude AI using the Model Context Protocol (MCP) on Windows 11, WSL 2, and Kali Linux.
Claude Security Tools
Run professional security testing tools (Nmap, Nikto, SQLmap, WPScan, and more) directly through Claude AI using MCP (Model Context Protocol) on Windows 11 + WSL 2 + Kali Linux.
ā ļø FOR EDUCATIONAL AND AUTHORIZED SECURITY TESTING ONLY
šÆ Overview
This project provides a fully-configured MCP server that integrates professional penetration testing tools with Claude AI. Chat with Claude to run security scans, enumerate systems, search for exploits, and more - all through natural language.
What is MCP?
Model Context Protocol (MCP) allows Claude to interact with external tools and systems. This server wraps security testing tools in an MCP interface, giving Claude the ability to run real pentesting commands on your behalf.
⨠Features
š ļø Security Tools Included
- Nmap - Network scanning and port discovery
- Nikto - Web server vulnerability scanning
- SQLmap - SQL injection detection and exploitation
- WPScan - WordPress vulnerability scanner
- Dirb - Web directory brute-forcing
- Searchsploit - Exploit-DB search
- Metasploit - Penetration testing framework
- Hydra - Network password cracker
- John the Ripper - Password hash cracker
š Key Capabilities
ā
Basic & Advanced Modes - Simple defaults for quick scans, full control for experts
ā
Stealth Scanning - Low-noise, IDS-evasion techniques
ā
Result Persistence - SQLite database + file storage
ā
Safety Confirmations - Destructive tools require explicit confirmation
ā
Input Sanitization - Protection against command injection
ā
Full Privileges - Root access for all scan types
ā
Formatted Output - Raw output + parsed structured data
š Prerequisites
Required Software
- Windows 11 (with virtualization enabled)
- WSL 2 (Windows Subsystem for Linux 2)
- Kali Linux (via Microsoft Store)
- Docker Desktop for Windows (with WSL 2 backend)
- Claude Desktop (with MCP support)
System Requirements
- 8GB RAM minimum (16GB recommended)
- 20GB free disk space
- Admin privileges on Windows
š Quick Start
1. Install WSL 2 + Kali Linux
From Windows PowerShell (Administrator):
# Enable WSL
wsl --install
# Restart computer when prompted
# Install Kali Linux
wsl --install -d kali-linux
# Verify installation
wsl -l -v
2. Install Docker Desktop
- Download Docker Desktop for Windows
- Install and enable WSL 2 backend
- Go to Settings ā Resources ā WSL Integration
- Enable integration with kali-linux
- Click Apply & Restart
3. Clone This Repository
From Kali Linux WSL:
# Open Kali WSL
wsl -d kali-linux
# Navigate to home directory
cd ~
# Clone the repository
git clone https://github.com/samtesura/claude-security-tools.git
cd claude-security-tools
# Make setup script executable
chmod +x setup.sh
4. Run Setup
# Run the automated setup script
./setup.sh
The setup script will:
- ā Check Docker Desktop integration
- ā Create necessary directories
- ā Build the Kali Linux container (~10-15 minutes)
- ā Configure environment variables
- ā Start the MCP server
- ā Verify installation
5. Configure Claude Desktop
Edit Claude Desktop config:
Windows path: %APPDATA%\Claude\claude_desktop_config.json
Add this to your MCP servers:
{
"mcpServers": {
"security-testing": {
"command": "wsl",
"args": [
"-d",
"kali-linux",
"--exec",
"docker",
"exec",
"-i",
"mcp-security-server",
"python3",
"/root/mcp_security_server.py"
],
"env": {
"SCAN_DB_PATH": "/data/scans.db",
"RESULTS_PATH": "/data/results"
}
}
}
}
6. Restart Claude Desktop
- Completely close Claude Desktop
- Reopen Claude Desktop
- Check the š icon - you should see "security-testing" connected
7. Start Scanning!
Ask Claude:
- "Run an nmap scan on 192.168.1.1"
- "Scan my network 192.168.1.0/24 for web servers"
- "Check if example.com has any web vulnerabilities with Nikto"
- "Search for WordPress exploits"
š Documentation
- - Detailed setup instructions
- - Tool examples and best practices
- - Common issues and solutions
- - How to contribute
š Usage Examples
Network Scanning
You: "Run a fast nmap scan on 192.168.1.0/24"
Claude: [Executes nmap -F -T2 192.168.1.0/24 and shows results]
Web Vulnerability Scanning
You: "Scan https://testsite.local for vulnerabilities"
Claude: [Runs Nikto scan and provides detailed findings]
WordPress Security Audit
You: "Check if wordpress-site.com has vulnerable plugins"
Claude: [Executes WPScan with enumeration and shows results]
Exploit Research
You: "Search for Apache 2.4.49 exploits"
Claude: [Queries Exploit-DB and shows available exploits]
š Security & Legal
ā ļø Legal Disclaimer
THIS TOOL IS FOR AUTHORIZED SECURITY TESTING AND EDUCATIONAL PURPOSES ONLY.
You must:
- ā Only test systems you own or have explicit written permission to test
- ā Comply with all applicable laws and regulations
- ā Never use these tools for malicious purposes
- ā Understand that unauthorized access to computer systems is illegal
The authors are not responsible for any misuse or damage caused by this software.
š”ļø Security Features
- Input Sanitization - All inputs validated to prevent command injection
- Confirmation Required - Destructive tools (SQLmap, Hydra) require explicit confirmation
- Isolated Container - Tools run in Docker container with controlled privileges
- Audit Trail - All scans logged to SQLite database
šļø Project Structure
claude-security-tools/
āāā mcp_security_server.py # Main MCP server (Python + FastMCP)
āāā Dockerfile # Kali Linux container definition
āāā docker-compose.yml # Container orchestration
āāā setup.sh # Automated setup script
āāā .env.template # Environment variables template
āāā LICENSE # MIT License
āāā README.md # This file
āāā data/ # Persistent data (created by setup)
ā āāā scans.db # SQLite database
ā āāā results/ # Scan output files
āāā docs/ # Documentation
āāā INSTALLATION.md # Detailed installation guide
š¾ Data Management
Viewing Results
From WSL:
cd ~/claude-security-tools
ls -lh data/results/
cat data/results/nmap_*.txt
From Windows:
Press Win+R
, type: \\wsl$\kali-linux\home\<username>\claude-security-tools\data\results
Backup to Windows Desktop
cp -r data "/mnt/c/Users/<your-username>/Desktop/security-backup-$(date +%Y%m%d)"
š¤ Contributing
Contributions are welcome! Please read for guidelines.
š License
This project is licensed under the MIT License - see the file for details.
š Acknowledgments
- Anthropic - For Claude and MCP
- Kali Linux Team - For the pentesting distribution
- Offensive Security - For security tools and training
Made with ā¤ļø for ethical hackers and security professionals
Remember: With great power comes great responsibility. Use these tools ethically and legally.