Server Configuration
Describes the environment variables required to run the server.
| Name | Required | Description | Default |
|---|---|---|---|
| NMAP_PATH | No | Custom path to the nmap binary | |
| SQLMAP_PATH | No | Custom path to the sqlmap binary | |
| GOBUSTER_PATH | No | Custom path to the gobuster binary |
Capabilities
Features and capabilities supported by this server
| Capability | Details |
|---|---|
| tools | {} |
Tools
Functions exposed to the LLM to take actions
| Name | Description |
|---|---|
| kali_network_nmap_scan | Perform network port scanning using Nmap. Nmap (Network Mapper) is a powerful network scanner for discovering hosts, services, and potential vulnerabilities. Capabilities:
Usage Notes:
Example:
|
| kali_network_nmap_discover | Discover live hosts on a network using Nmap. Supports ping, ARP, TCP, UDP, and ICMP discovery methods. |
| kali_network_masscan_scan | High-speed port scanner capable of scanning the entire internet in minutes. Use with caution and proper authorization. |
| kali_network_netdiscover_scan | ARP reconnaissance tool for discovering hosts on a local network. Supports active and passive modes. |
| kali_network_tcpdump_capture | Capture network packets for analysis. Supports BPF filters and can save to PCAP files. |
| kali_network_tshark_capture | Wireshark CLI for packet capture and analysis with advanced filtering and multiple output formats. |
| kali_web_gobuster_dir | Enumerate directories and files on web servers using wordlists. Gobuster is a fast directory/file brute-forcing tool written in Go. Features:
Example:
|
| kali_web_gobuster_dns | Enumerate subdomains using DNS brute-forcing with wordlists. |
| kali_web_sqlmap_test | Automated SQL injection testing and exploitation. SQLMap automates the detection and exploitation of SQL injection vulnerabilities. WARNING: Only use on systems you have authorization to test. Features:
Example:
|
| kali_web_nikto_scan | Comprehensive web server scanner for vulnerabilities, misconfigurations, and security issues. |
| kali_web_wpscan_scan | WordPress security scanner for finding vulnerabilities in WordPress sites, themes, and plugins. |
| kali_web_ffuf_fuzz | Fast web fuzzer for discovering hidden files, directories, and parameters. URL must contain FUZZ keyword. |
| kali_web_nuclei_scan | Template-based vulnerability scanner with extensive CVE coverage and custom templates support. |
| kali_password_hydra_brute | Fast network login brute-forcer supporting many protocols. Hydra is a parallelized login cracker which supports numerous protocols. Supported Services:
WARNING: Only use on systems you have authorization to test. Example:
|
| kali_password_john_crack | John the Ripper password cracker supporting many hash formats and attack modes. |
| kali_password_hashcat_crack | Advanced password recovery tool using GPU acceleration. Supports 300+ hash types. |
| kali_exploit_searchsploit_search | Search the Exploit Database for public exploits and vulnerability information. SearchSploit is a command-line search tool for Exploit-DB. Search Options:
Example:
|
| kali_exploit_searchsploit_examine | Examine and display the contents of an exploit from searchsploit results. |
| kali_exploit_msfvenom_generate | Generate custom payloads for Metasploit Framework. Msfvenom is a payload generator and encoder combining msfpayload and msfencode. WARNING: Only use generated payloads for authorized security testing. Common Payloads:
Example:
|
Prompts
Interactive templates invoked by user choice
| Name | Description |
|---|---|
No prompts | |
Resources
Contextual data attached and managed by the client
| Name | Description |
|---|---|
No resources | |