Kali Linux Security Tools MCP Server

Kali Linux Security Tools MCP Server

Provides access to 30+ Kali Linux penetration testing tools including Nmap, SQLmap, Metasploit, and others for authorized security testing, vulnerability scanning, and network reconnaissance through Claude Desktop.

Category
Visit Server

README

Kali Linux Security Tools MCP Server

A comprehensive MCP server providing access to 30+ Kali Linux penetration testing tools through Claude Desktop.

⚠️ LEGAL WARNING

IMPORTANT: These tools are for EDUCATIONAL PURPOSES ONLY. Only use on:

  • Systems you own
  • Systems you have explicit written permission to test
  • Controlled lab environments

Unauthorized access, scanning, or testing of computer systems may be ILLEGAL in your jurisdiction and could result in criminal prosecution.

🛠️ Available Tools (30+ Tools)

Network Scanning

  • nmap_scan - Port scanning and service detection
  • masscan_scan - High-speed port scanning
  • netdiscover_scan - Network host discovery

Web Application Testing

  • nikto_scan - Web server vulnerability scanning
  • sqlmap_scan - SQL injection testing
  • wpscan_scan - WordPress security testing
  • dirb_scan - Directory brute forcing
  • gobuster_scan - Fast directory/DNS brute forcing
  • whatweb_scan - Web technology identification
  • wafw00f_scan - WAF detection
  • commix_scan - Command injection testing

SSL/TLS Testing

  • sslscan_test - SSL/TLS configuration testing
  • testssl_test - Comprehensive SSL/TLS testing

DNS Tools

  • dnsenum_scan - DNS enumeration
  • dnsrecon_scan - DNS reconnaissance
  • fierce_scan - DNS and subdomain enumeration

Password Cracking

  • john_crack - Password hash cracking
  • hydra_crack - Login brute forcing
  • crunch_generate - Custom wordlist generation

Exploitation

  • searchsploit_search - Exploit database search
  • msfconsole_search - Metasploit module search

Information Gathering

  • whois_lookup - Domain WHOIS information
  • theharvester_search - Email and subdomain harvesting
  • smtp_user_enum - SMTP user enumeration

Wireless Testing

  • aircrack_info - Wireless interface information

System Auditing

  • lynis_audit - System security auditing

Forensics

  • exiftool_analyze - File metadata extraction
  • binwalk_analyze - Embedded file analysis

Utilities

  • netcat_connect - TCP/UDP connection testing

📋 Prerequisites

  • Docker Desktop installed
  • Claude Desktop installed
  • At least 8GB RAM
  • 20GB free disk space

🚀 Quick Start

1. Clone the Repository

cd ~/MCP/kali
git clone https://github.com/JesseEikeland/kali-linux-mcp.git .

2. Create Output Directory

mkdir output

3. Build the Docker Container

docker-compose build

This will take 10-15 minutes as it downloads Kali Linux and installs all security tools.

4. Test the Server

docker-compose up

You should see log messages indicating the server has started. Press Ctrl+C to stop.

5. Configure Claude Desktop

Edit your Claude Desktop configuration file:

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json

Windows: %APPDATA%\Claude\claude_desktop_config.json

Add this configuration:

{
  "mcpServers": {
    "kali-security-tools": {
      "command": "docker",
      "args": [
        "compose",
        "-f",
        "/Users/jesse/MCP/kali/docker-compose.yml",
        "run",
        "--rm",
        "kali-mcp-server"
      ]
    }
  }
}

Note: The path /Users/jesse/MCP/kali/docker-compose.yml is already set for your system. If you cloned to a different location, update this path.

6. Restart Claude Desktop

Completely quit and restart Claude Desktop.

7. Verify Installation

In Claude Desktop, start a new conversation and look for the 🔌 icon indicating MCP tools are available. You should see 30+ security tools available.

8. Test a Tool

Try this prompt in Claude:

Use searchsploit_search to search for "wordpress" exploits

📁 File Storage

Place files to analyze in the ./output directory. Tools like exiftool_analyze and binwalk_analyze will access files from this location.

🔒 Security Features

  • Non-root execution
  • Input sanitization
  • Command timeout protection
  • Dangerous character filtering
  • IP and domain validation
  • Logging for audit trails

📝 Usage Examples

Port Scanning

Use nmap_scan to scan 192.168.1.1 with scan_type "basic"

Web Vulnerability Scanning

Use nikto_scan to test http://testsite.local on port 80

SQL Injection Testing

Use sqlmap_scan to test http://testsite.local/page.php?id=1

Exploit Search

Use searchsploit_search to find exploits for "apache 2.4"

WordPress Scanning

Use wpscan_scan to scan https://example.com with enumerate "vp"

⚡ Performance Notes

  • Some scans may take several minutes
  • Timeout limits prevent hanging
  • Network mode: host (for raw packet access)
  • Requires NET_ADMIN and NET_RAW capabilities

🐛 Troubleshooting

Permission Errors

Ensure Docker has proper capabilities set in docker-compose.yml

Timeout Issues

Increase timeout values in server.py for long-running scans

Network Issues

Verify network_mode: host is set for tools requiring raw sockets

Container Won't Start

# Check logs
docker-compose logs

# Rebuild container
docker-compose build --no-cache

🔄 Updating Tools

To update the security tools database:

docker-compose run --rm kali-mcp-server sudo searchsploit -u

📚 Additional Resources

⚖️ Ethical Use

Always follow responsible disclosure practices. If you discover vulnerabilities:

  1. Document findings carefully
  2. Notify the system owner privately
  3. Allow reasonable time for fixes
  4. Do not disclose publicly without permission

🤝 Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

📄 License

For educational and authorized testing purposes only.

⚠️ Disclaimer

The authors and contributors are not responsible for misuse of these tools. Users are solely responsible for ensuring they have proper authorization before testing any systems.

🌟 Star This Repo

If you find this useful, please star the repository!

Recommended Servers

playwright-mcp

playwright-mcp

A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.

Official
Featured
TypeScript
Magic Component Platform (MCP)

Magic Component Platform (MCP)

An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.

Official
Featured
Local
TypeScript
Audiense Insights MCP Server

Audiense Insights MCP Server

Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.

Official
Featured
Local
TypeScript
VeyraX MCP

VeyraX MCP

Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.

Official
Featured
Local
Kagi MCP Server

Kagi MCP Server

An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.

Official
Featured
Python
graphlit-mcp-server

graphlit-mcp-server

The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.

Official
Featured
TypeScript
Qdrant Server

Qdrant Server

This repository is an example of how to create a MCP server for Qdrant, a vector search engine.

Official
Featured
Neon Database

Neon Database

MCP server for interacting with Neon Management API and databases

Official
Featured
Exa Search

Exa Search

A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.

Official
Featured
E2B

E2B

Using MCP to run code via e2b.

Official
Featured