Provides access to 30+ Kali Linux penetration testing tools including network scanning, web application testing, SSL/TLS testing, DNS enumeration, password cracking, exploit searching, and forensics capabilities.
Enables searching for Metasploit modules through the msfconsole_search tool for exploitation and security testing.
Provides WordPress security testing capabilities through the wpscan_scan tool for vulnerability assessment and enumeration.
Kali Linux Security Tools MCP Server
A comprehensive MCP server providing access to 30+ Kali Linux penetration testing tools through Claude Desktop.
⚠️ LEGAL WARNING
IMPORTANT: These tools are for EDUCATIONAL PURPOSES ONLY. Only use on:
Systems you own
Systems you have explicit written permission to test
Controlled lab environments
Unauthorized access, scanning, or testing of computer systems may be ILLEGAL in your jurisdiction and could result in criminal prosecution.
🛠️ Available Tools (30+ Tools)
Network Scanning
nmap_scan- Port scanning and service detectionmasscan_scan- High-speed port scanningnetdiscover_scan- Network host discovery
Web Application Testing
nikto_scan- Web server vulnerability scanningsqlmap_scan- SQL injection testingwpscan_scan- WordPress security testingdirb_scan- Directory brute forcinggobuster_scan- Fast directory/DNS brute forcingwhatweb_scan- Web technology identificationwafw00f_scan- WAF detectioncommix_scan- Command injection testing
SSL/TLS Testing
sslscan_test- SSL/TLS configuration testingtestssl_test- Comprehensive SSL/TLS testing
DNS Tools
dnsenum_scan- DNS enumerationdnsrecon_scan- DNS reconnaissancefierce_scan- DNS and subdomain enumeration
Password Cracking
john_crack- Password hash crackinghydra_crack- Login brute forcingcrunch_generate- Custom wordlist generation
Exploitation
searchsploit_search- Exploit database searchmsfconsole_search- Metasploit module search
Information Gathering
whois_lookup- Domain WHOIS informationtheharvester_search- Email and subdomain harvestingsmtp_user_enum- SMTP user enumeration
Wireless Testing
aircrack_info- Wireless interface information
System Auditing
lynis_audit- System security auditing
Forensics
exiftool_analyze- File metadata extractionbinwalk_analyze- Embedded file analysis
Utilities
netcat_connect- TCP/UDP connection testing
📋 Prerequisites
Docker Desktop installed
Claude Desktop installed
At least 8GB RAM
20GB free disk space
🚀 Quick Start
1. Clone the Repository
2. Create Output Directory
3. Build the Docker Container
This will take 10-15 minutes as it downloads Kali Linux and installs all security tools.
4. Test the Server
You should see log messages indicating the server has started. Press Ctrl+C to stop.
5. Configure Claude Desktop
Edit your Claude Desktop configuration file:
macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%\Claude\claude_desktop_config.json
Add this configuration:
Note: The path /Users/jesse/MCP/kali/docker-compose.yml is already set for your system. If you cloned to a different location, update this path.
6. Restart Claude Desktop
Completely quit and restart Claude Desktop.
7. Verify Installation
In Claude Desktop, start a new conversation and look for the 🔌 icon indicating MCP tools are available. You should see 30+ security tools available.
8. Test a Tool
Try this prompt in Claude:
📁 File Storage
Place files to analyze in the ./output directory. Tools like exiftool_analyze and binwalk_analyze will access files from this location.
🔒 Security Features
Non-root execution
Input sanitization
Command timeout protection
Dangerous character filtering
IP and domain validation
Logging for audit trails
📝 Usage Examples
Port Scanning
Web Vulnerability Scanning
SQL Injection Testing
Exploit Search
WordPress Scanning
⚡ Performance Notes
Some scans may take several minutes
Timeout limits prevent hanging
Network mode: host (for raw packet access)
Requires NET_ADMIN and NET_RAW capabilities
🐛 Troubleshooting
Permission Errors
Ensure Docker has proper capabilities set in docker-compose.yml
Timeout Issues
Increase timeout values in server.py for long-running scans
Network Issues
Verify network_mode: host is set for tools requiring raw sockets
Container Won't Start
🔄 Updating Tools
To update the security tools database:
📚 Additional Resources
⚖️ Ethical Use
Always follow responsible disclosure practices. If you discover vulnerabilities:
Document findings carefully
Notify the system owner privately
Allow reasonable time for fixes
Do not disclose publicly without permission
🤝 Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
📄 License
For educational and authorized testing purposes only.
⚠️ Disclaimer
The authors and contributors are not responsible for misuse of these tools. Users are solely responsible for ensuring they have proper authorization before testing any systems.
🌟 Star This Repo
If you find this useful, please star the repository!