kali-mcp-server

santibarclay/kali-mcp-server

3.2

If you are the rightful owner of kali-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.

A Model Context Protocol (MCP) server that integrates Kali Linux security tools with Claude Desktop for penetration testing.

Tools
4
Resources
0
Prompts
0

Kali Linux Security Tools MCP Server

A Model Context Protocol (MCP) server that provides access to Kali Linux penetration testing tools through Claude Desktop.

⚠️ For educational purposes and authorized testing only

Tools

ToolDescription
nmap_scanNetwork port scanning and service detection
nikto_scanWeb vulnerability scanning (traditional apps)
searchsploit_searchSearch exploit database
list_wordlistsList available wordlists
httpx_probeFast HTTP probe for discovering live hosts and services
gobuster_dirDirectory/file brute forcer optimized for modern web apps
ffuf_fuzzFast web fuzzer for directory discovery and parameter fuzzing

Quick Start

  1. Start the container:

    docker-compose up --build -d
    
  2. Add to Claude Desktop config (~/Library/Application Support/Claude/claude_desktop_config.json):

    {
      "mcpServers": {
        "kali-security": {
          "command": "docker",
          "args": ["exec", "-i", "kali-security-mcp", "python3", "server_native.py"],
          "env": {}
        }
      }
    }
    
  3. Restart Claude Desktop

Usage Examples

Requirements

  • Docker and Docker Compose
  • Claude Desktop

Security Features

  • Containerized execution
  • Input sanitization
  • Non-root user
  • Command timeouts

Notes

  • Traditional vs Modern Apps:
    • Nikto: Best for traditional web apps (PHP/Apache/Nginx)
    • Modern SPAs: Use httpx, gobuster, and ffuf for better results with React/Angular/Vue apps
  • Recommended workflow for SPAs:
    1. httpx: Probe for live services and technology detection
    2. gobuster: Directory/file brute forcing
    3. ffuf: Parameter fuzzing and advanced discovery
  • Testing targets: Use JuiceShop (OWASP vulnerable app) for safe testing
  • Restart Claude Desktop after timeout errors for better performance