Kali MCP Server
Provides access to 20+ Kali Linux penetration testing tools through isolated Docker containers, enabling network scanning, vulnerability assessment, password cracking, web security testing, and forensics through natural language commands.
README
Kali MCP Server 🌟
A powerful MCP (Model Context Protocol) server that provides access to Kali Linux penetration testing tools through Docker containers.
Features
- 🚀 20 Specialized Tools for comprehensive Kali Linux operations
- 🐳 Docker Integration - Runs Kali in isolated containers
- 🔒 Secure Execution - Commands run inside Kali container
- 📦 Easy Installation - Available globally via npm
- 🛠️ Complete Toolkit - All major Kali Linux tool categories
Installation
Global Installation (Recommended)
npm install -g kali-mcp-server
Local Installation
git clone <repository-url>
cd kali-mcp-server
npm install
npm start
MCP Configuration
Add this to your .kilocode/mcp.json or any MCP configuration:
{
"mcpServers": {
"kali": {
"command": "npx",
"args": ["-y", "kali-mcp-server"]
}
}
}
Available Tools (20 Total!)
Core Container Management
run_kali_command- Execute any command inside Kali containerstart_kali_container- Start the Kali containerstop_kali_container- Stop the Kali containerkali_container_status- Check container status
Package Management
install_kali_package- Install Kali packages via aptupdate_kali_system- Update Kali system packages
Network & Service Scanning
kali_network_scan- Network scanning (nmap, masscan)kali_service_scan- Service scanning and enumeration
Information Gathering
kali_information_gathering- OSINT and reconnaissance (whois, dnsrecon, theharvester)
Vulnerability Assessment
kali_vulnerability_scan- Vulnerability scanning (nikto, dirb, gobuster)
Web Application Security
kali_web_scan- Web app testing (sqlmap, dirb, nikto, wpscan)
Password Cracking
kali_password_crack- Password tools (john, hashcat, hydra)
Wireless Tools
kali_wireless_tools- WiFi analysis (airodump-ng, aireplay-ng)
Digital Forensics
kali_forensics- Forensics tools (volatility, autopsy, binwalk)
Exploitation Tools
kali_exploitation- Exploit development (metasploit, searchsploit)
Social Engineering
kali_social_engineering- SE tools (setoolkit, king-phisher)
Reverse Engineering
kali_reverse_engineering- Advanced RE tools (radare2, gdb, strace, ltrace, checksec, patchelf)
Stress Testing
kali_stress_testing- DoS tools (slowloris, torshammer)
Network Sniffing & Spoofing
kali_sniffing_spoofing- Sniffing tools (wireshark, tcpdump, arpspoof)
Universal Command Tool
run_kali_command- Execute any Kali command directly
Use Cases
- Penetration Testing - Complete toolkit in isolated environment
- Network Security - Scanning, sniffing, and spoofing tools
- Web Application Security - SQL injection, directory scanning, vulnerability assessment
- Wireless Security - WiFi analysis and attack tools
- Digital Forensics - Memory analysis, disk forensics, evidence collection
- Password Security - Hash cracking, brute force testing
- Reverse Engineering - Binary analysis, debugging, disassembly, decompilation
- Social Engineering - Phishing, credential harvesting tools
- Vulnerability Research - Exploit development and testing
- Security Training - Learn ethical hacking in safe environment
- CTF Challenges - Complete toolkit for capture the flag competitions
Security Features
- 🔐 Commands execute inside Docker container
- 🛡️ Isolated from host system
- 📝 Full audit trail of executed commands
- 🗑️ Automatic cleanup of containers
Requirements
- Docker installed and running
- Node.js 16+
- Internet connection (for npm packages)
Development
# Clone and setup
git clone <repository-url>
cd kali-mcp-server
npm install
# Run locally
npm start
# Publish to npm (after npm login)
npm publish --access public
License
MIT License - See LICENSE file for details.
Support
For issues and feature requests, please create an issue in the repository.
authors:vasanth, meghana
⚠️ Disclaimer: This tool is for educational and authorized penetration testing only. Ensure you have permission before scanning any networks or systems.
Recommended Servers
playwright-mcp
A Model Context Protocol server that enables LLMs to interact with web pages through structured accessibility snapshots without requiring vision models or screenshots.
Audiense Insights MCP Server
Enables interaction with Audiense Insights accounts via the Model Context Protocol, facilitating the extraction and analysis of marketing insights and audience data including demographics, behavior, and influencer engagement.
Magic Component Platform (MCP)
An AI-powered tool that generates modern UI components from natural language descriptions, integrating with popular IDEs to streamline UI development workflow.
VeyraX MCP
Single MCP tool to connect all your favorite tools: Gmail, Calendar and 40 more.
Kagi MCP Server
An MCP server that integrates Kagi search capabilities with Claude AI, enabling Claude to perform real-time web searches when answering questions that require up-to-date information.
graphlit-mcp-server
The Model Context Protocol (MCP) Server enables integration between MCP clients and the Graphlit service. Ingest anything from Slack to Gmail to podcast feeds, in addition to web crawling, into a Graphlit project - and then retrieve relevant contents from the MCP client.
Qdrant Server
This repository is an example of how to create a MCP server for Qdrant, a vector search engine.
Neon Database
MCP server for interacting with Neon Management API and databases
Exa Search
A Model Context Protocol (MCP) server lets AI assistants like Claude use the Exa AI Search API for web searches. This setup allows AI models to get real-time web information in a safe and controlled way.
E2B
Using MCP to run code via e2b.