Vasanthadithya-mundrathi/kali-mcp-server
If you are the rightful owner of kali-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
Kali MCP Server is a robust Model Context Protocol server that facilitates access to Kali Linux penetration testing tools through Docker containers.
Kali MCP Server 🌟
A powerful MCP (Model Context Protocol) server that provides access to Kali Linux penetration testing tools through Docker containers.
Features
- 🚀 20 Specialized Tools for comprehensive Kali Linux operations
- 🐳 Docker Integration - Runs Kali in isolated containers
- 🔒 Secure Execution - Commands run inside Kali container
- 📦 Easy Installation - Available globally via npm
- 🛠️ Complete Toolkit - All major Kali Linux tool categories
Installation
Global Installation (Recommended)
npm install -g kali-mcp-server
Local Installation
git clone <repository-url>
cd kali-mcp-server
npm install
npm start
MCP Configuration
Add this to your .kilocode/mcp.json or any MCP configuration:
{
"mcpServers": {
"kali": {
"command": "npx",
"args": ["-y", "kali-mcp-server"]
}
}
}
Available Tools (20 Total!)
Core Container Management
run_kali_command- Execute any command inside Kali containerstart_kali_container- Start the Kali containerstop_kali_container- Stop the Kali containerkali_container_status- Check container status
Package Management
install_kali_package- Install Kali packages via aptupdate_kali_system- Update Kali system packages
Network & Service Scanning
kali_network_scan- Network scanning (nmap, masscan)kali_service_scan- Service scanning and enumeration
Information Gathering
kali_information_gathering- OSINT and reconnaissance (whois, dnsrecon, theharvester)
Vulnerability Assessment
kali_vulnerability_scan- Vulnerability scanning (nikto, dirb, gobuster)
Web Application Security
kali_web_scan- Web app testing (sqlmap, dirb, nikto, wpscan)
Password Cracking
kali_password_crack- Password tools (john, hashcat, hydra)
Wireless Tools
kali_wireless_tools- WiFi analysis (airodump-ng, aireplay-ng)
Digital Forensics
kali_forensics- Forensics tools (volatility, autopsy, binwalk)
Exploitation Tools
kali_exploitation- Exploit development (metasploit, searchsploit)
Social Engineering
kali_social_engineering- SE tools (setoolkit, king-phisher)
Reverse Engineering
kali_reverse_engineering- Advanced RE tools (radare2, gdb, strace, ltrace, checksec, patchelf)
Stress Testing
kali_stress_testing- DoS tools (slowloris, torshammer)
Network Sniffing & Spoofing
kali_sniffing_spoofing- Sniffing tools (wireshark, tcpdump, arpspoof)
Universal Command Tool
run_kali_command- Execute any Kali command directly
Use Cases
- Penetration Testing - Complete toolkit in isolated environment
- Network Security - Scanning, sniffing, and spoofing tools
- Web Application Security - SQL injection, directory scanning, vulnerability assessment
- Wireless Security - WiFi analysis and attack tools
- Digital Forensics - Memory analysis, disk forensics, evidence collection
- Password Security - Hash cracking, brute force testing
- Reverse Engineering - Binary analysis, debugging, disassembly, decompilation
- Social Engineering - Phishing, credential harvesting tools
- Vulnerability Research - Exploit development and testing
- Security Training - Learn ethical hacking in safe environment
- CTF Challenges - Complete toolkit for capture the flag competitions
Security Features
- 🔐 Commands execute inside Docker container
- 🛡️ Isolated from host system
- 📝 Full audit trail of executed commands
- 🗑️ Automatic cleanup of containers
Requirements
- Docker installed and running
- Node.js 16+
- Internet connection (for npm packages)
Development
# Clone and setup
git clone <repository-url>
cd kali-mcp-server
npm install
# Run locally
npm start
# Publish to npm (after npm login)
npm publish --access public
License
MIT License - See LICENSE file for details.
Support
For issues and feature requests, please create an issue in the repository.
authors:vasanth, meghana
⚠️ Disclaimer: This tool is for educational and authorized penetration testing only. Ensure you have permission before scanning any networks or systems.