Skip to main content
Glama

MCP Kali Server - Bug Hunting Arsenal

Author: LAKSHMIKANTHAN K (letchupkt)


๐Ÿ“– Table of Contents


๐ŸŒŸ Overview

Kali MCP Server is a revolutionary AI-powered cybersecurity platform that bridges the gap between artificial intelligence and penetration testing. This comprehensive system provides direct integration with 55+ professional security tools through multiple AI interfaces.

๐Ÿ”— Repository: https://github.com/letchupkt/kali-mcp.git

๐ŸŽฏ What Makes This Special?

  • AI-Driven Security Testing: Let AI models intelligently chain security tools for comprehensive assessments

  • Multiple AI Interfaces: Support for Claude Desktop, 5ire, and direct Ollama integration

  • Professional Arsenal: 25+ industry-standard tools for bug hunting and penetration testing

  • Real-time Execution: Direct command execution with formatted results and analysis

  • Intelligent Workflows: AI automatically suggests and executes appropriate tool combinations

๐Ÿ” Use Cases

  • Bug Bounty Hunting: Automated reconnaissance and vulnerability discovery

  • Penetration Testing: AI-assisted security assessments and exploitation

  • CTF Challenges: Real-time problem solving with AI guidance

  • Red Team Operations: Streamlined attack surface mapping and exploitation

  • Security Research: Rapid prototyping and testing of security concepts

๐ŸŽฌ Demo Videos

Example solving web CTF challenge in RamadanCTF

https://github.com/user-attachments/assets/dc93b71d-9a4a-4ad5-8079-2c26c04e5397

Solving HTB machine "code"

https://github.com/user-attachments/assets/3ec06ff8-0bdf-4ad5-be71-2ec490b7ee27


๐Ÿš€ Features

๐Ÿง  AI Integration Capabilities

  • Multi-Platform Support: Claude Desktop, 5ire, Ollama, and custom MCP clients

  • Natural Language Processing: Convert plain English to security tool execution

  • Intelligent Parameter Extraction: Automatically parse targets, options, and configurations

  • Contextual Tool Selection: AI suggests appropriate tools based on objectives

  • Result Analysis: AI interprets and explains tool outputs

๐Ÿ›ก๏ธ Security Arsenal

  • 55+ Professional Tools: Industry-standard security testing utilities

  • Real-time Execution: Direct command execution with live output streaming

  • Comprehensive Coverage: From reconnaissance to exploitation

  • Automated Workflows: Chain multiple tools for complete assessments

  • Custom Tool Integration: Easy addition of new security tools

๐Ÿ”ง Technical Features

  • RESTful API: Clean, documented API for all tool interactions

  • Health Monitoring: Real-time tool availability and status checking

  • Error Handling: Graceful handling of timeouts and failures

  • Logging: Comprehensive logging for audit and debugging

  • Cross-Platform: Works on Linux, Windows, and macOS clients


๐Ÿ—๏ธ Architecture

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ AI Client โ”‚ โ”‚ MCP Server โ”‚ โ”‚ Kali Server โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ€ข Claude โ”‚โ—„โ”€โ”€โ–บโ”‚ โ€ข Tool Mapping โ”‚โ—„โ”€โ”€โ–บโ”‚ โ€ข Tool Executionโ”‚ โ”‚ โ€ข 5ire โ”‚ โ”‚ โ€ข Parameter โ”‚ โ”‚ โ€ข Result โ”‚ โ”‚ โ€ข Ollama โ”‚ โ”‚ Processing โ”‚ โ”‚ Processing โ”‚ โ”‚ โ€ข Custom โ”‚ โ”‚ โ€ข Result โ”‚ โ”‚ โ€ข Health Check โ”‚ โ”‚ โ”‚ โ”‚ Formatting โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Component Breakdown

  1. AI Client Layer: Interfaces with various AI models and platforms

  2. MCP Server Layer: Translates AI requests to tool-specific API calls

  3. Kali Server Layer: Executes security tools and returns formatted results


๐Ÿ› ๏ธ Installation

Prerequisites

  • Linux Machine (Kali Linux recommended)

  • Python 3.8+

  • Git

  • Internet Connection (for tool downloads)

Step 1: Clone Repository

git clone https://github.com/letchupkt/kali-mcp.git cd kali-mcp

Step 2: Install Security Tools

# Make installation script executable chmod +x install_tools.sh # Run comprehensive tool installation (takes 15-30 minutes) sudo ./install_tools.sh

What gets installed:

  • Go Environment: Required for modern security tools

  • Subdomain Tools: subfinder, sublister, amass, assetfinder, chaos, shosubgo, github-subdomains

  • DNS Tools: dnsx, shuffledns, puredns, alterx

  • HTTP Tools: httpx, tlsx, katana, gospider, hakrawler

  • Content Discovery: ffuf, feroxbuster, dirsearch, gobuster, dirb

  • Vulnerability Scanners: nuclei, nikto, wpscan, dalfox, crlfuzz

  • Port Scanners: masscan, rustscan, naabu

  • URL Discovery: waybackurls, gau, gauplus

  • Parameter Tools: arjun, paramspider, qsreplace

  • Utility Tools: notify, interactsh, anew, unfurl, gf, mapcidr, cdncheck, asnmap, uncover

  • And many more...

Step 3: Install Python Dependencies

pip3 install -r requirements.txt

Step 4: Start the Kali Server

python3 kali_server.py

Expected Output:

====================================================================== ๐Ÿš€ KALI LINUX API SERVER - BUG HUNTING ARSENAL ๐Ÿ‘จโ€๐Ÿ’ป Author: LAKSHMIKANTHAN K (letchupkt) ยฉ 2025 LAKSHMIKANTHAN K (letchupkt) ====================================================================== INFO:__main__:Starting Kali Linux Tools API Server on port 5000 INFO:__main__:25+ Security tools ready for bug hunting and penetration testing ====================================================================== * Running on all addresses (0.0.0.0) * Running on http://127.0.0.1:5000 * Running on http://192.168.1.100:5000

๐ŸŽฎ Usage Methods

Method 1: Claude Desktop Integration

Setup:

  1. Edit Claude Desktop configuration:

    # Windows C:\Users\USERNAME\AppData\Roaming\Claude\claude_desktop_config.json # macOS ~/Library/Application Support/Claude/claude_desktop_config.json
  2. Add MCP server configuration:

    { "mcpServers": { "kali_mcp": { "command": "python3", "args": [ "/absolute/path/to/mcp_server.py", "--server", "http://KALI_IP:5000" ] } } }
  3. Restart Claude Desktop

Usage Example:

You: "Perform comprehensive subdomain enumeration for example.com" Claude: I'll help you enumerate subdomains for example.com using multiple tools. [Executes subfinder_scan, sublister_scan, amass_scan, assetfinder_scan] Results show 47 unique subdomains discovered across all tools...

Method 2: 5ire Desktop Integration

Setup:

  1. Open 5ire Desktop

  2. Navigate to MCP Settings

  3. Add new MCP server:

    Command: python3 /absolute/path/to/mcp_server.py http://KALI_IP:5000

Method 3: Direct Ollama Integration (Recommended)

Setup:

# Install Ollama curl -fsSL https://ollama.com/install.sh | sh # Pull a capable model ollama pull llama3.2 # or for better performance: ollama pull codellama:13b # Start the Ollama client python3 ollama_client.py --kali-server http://KALI_IP:5000 --model llama3.2

Interactive Session:

====================================================================== ๐Ÿš€ KALI MCP SERVER - BUG HUNTING ARSENAL ๐Ÿ‘จโ€๐Ÿ’ป Author: LAKSHMIKANTHAN K (letchupkt) ยฉ 2025 LAKSHMIKANTHAN K (letchupkt) ====================================================================== ๐Ÿค– Model: llama3.2 ๐Ÿ”— Kali Server: http://192.168.1.100:5000 ====================================================================== ๐ŸŽฏ Bug Hunting Arsenal Ready! ๐Ÿ“‹ Type 'help' to see available tools and examples ๐Ÿ”ง Type 'tools' to list all available security tools โŒ Type 'exit' or 'quit' to end the session ====================================================================== ๐ŸŽฏ You: Enumerate subdomains for example.com and check for takeovers ๐Ÿ”ง Executing detected tools... โšก Running subfinder with parameters: {'domain': 'example.com'} ๐Ÿ”ง **SUBFINDER Results** ================================================== ๐Ÿ“‹ **Output:**

admin.example.com api.example.com blog.example.com dev.example.com mail.example.com ...

โšก Running subzy with parameters: {'target': 'example.com'} ๐Ÿ”ง **SUBZY Results** ================================================== ๐Ÿ“‹ **Output:**

[VULNERABLE] dev.example.com - GitHub Pages takeover possible [SAFE] admin.example.com - No takeover detected ...

๐Ÿค– Assistant: I've discovered 23 subdomains for example.com and found 1 potential subdomain takeover vulnerability on dev.example.com pointing to GitHub Pages. Here's what you should do next: 1. Verify the GitHub Pages takeover by checking if the repository exists 2. Probe the live subdomains with httpx for technology detection 3. Run nuclei scans on the active services Would you like me to continue with these next steps?

๐ŸŽฏ Bug Hunting Workflows

Workflow 1: Complete Reconnaissance

AI Prompt:

"Perform complete reconnaissance on target.com including subdomain enumeration, HTTP probing, content discovery, and vulnerability scanning"

Execution Flow:

  1. Subdomain Discovery

    • subfinder -d target.com

    • sublister -d target.com

    • amass enum -d target.com

    • assetfinder target.com

  2. HTTP Service Probing

    • httpx -l subdomains.txt -title -tech-detect -status-code

    • katana -u target.com -depth 3

  3. Content Discovery

    • ffuf -u https://target.com/FUZZ -w wordlist.txt

    • feroxbuster -u https://target.com

    • gobuster dir -u https://target.com

  4. Vulnerability Scanning

    • nuclei -l live_urls.txt -t cves,exposures

    • nikto -h target.com

Workflow 2: Subdomain Takeover Hunt

AI Prompt:

"Check target.com for subdomain takeover vulnerabilities"

Execution Flow:

  1. Subdomain Enumeration

    • Multiple subdomain discovery tools

    • Consolidate unique results

  2. Takeover Detection

    • subzy run --targets subdomains.txt

    • subjack -w subdomains.txt -t 100 -timeout 30 -o results.txt

  3. Verification

    • Manual verification of flagged subdomains

    • Service identification and exploitation assessment

Workflow 3: Web Application Security Assessment

AI Prompt:

"Test https://webapp.com for web application vulnerabilities"

Execution Flow:

  1. Crawling & Spidering

    • katana -u https://webapp.com

    • gospider -s https://webapp.com

    • hakrawler -url https://webapp.com

  2. Parameter Discovery

    • arjun -u https://webapp.com

    • paramspider -d webapp.com

  3. Vulnerability Testing

    • dalfox url https://webapp.com (XSS)

    • crlfuzz -u https://webapp.com (CRLF)

    • sqlmap -u https://webapp.com/page?id=1 (SQLi)

    • nuclei -u https://webapp.com -t web-vulnerabilities

Workflow 4: Advanced DNS & Infrastructure Mapping

AI Prompt:

"Perform comprehensive DNS enumeration and infrastructure mapping for target.com"

Execution Flow:

  1. Passive Subdomain Discovery

    • subfinder -d target.com

    • chaos -d target.com

    • github-subdomains -d target.com

  2. Active DNS Bruteforcing

    • shuffledns -d target.com -w wordlist.txt

    • puredns bruteforce wordlist.txt target.com

  3. DNS Resolution & Validation

    • dnsx -l subdomains.txt -resp -a -cname

    • alterx -l subdomains.txt | dnsx

  4. Infrastructure Analysis

    • tlsx -l subdomains.txt -san -cn

    • cdncheck -l subdomains.txt

    • asnmap -d target.com

    • mapcidr -cidr 192.168.1.0/24

Workflow 5: Fast Port Scanning & Service Detection

AI Prompt:

"Scan target.com for open ports and identify running services"

Execution Flow:

  1. Fast Port Discovery

    • naabu -host target.com -top-ports 1000

    • rustscan -a target.com

  2. Comprehensive Port Scan

    • masscan target.com -p1-65535 --rate=10000

  3. Service Detection

    • nmap -sCV -p 80,443,8080 target.com

    • httpx -l ports.txt -title -tech-detect

Workflow 6: URL Discovery & Analysis

AI Prompt:

"Discover all historical URLs and endpoints for target.com"

Execution Flow:

  1. Historical URL Discovery

    • echo "target.com" | waybackurls

    • echo "target.com" | gau

    • echo "target.com" | gauplus

  2. URL Parsing & Filtering

    • cat urls.txt | unfurl domains

    • cat urls.txt | unfurl paths

    • cat urls.txt | gf xss

  3. Parameter Manipulation

    • cat urls.txt | qsreplace "FUZZ"

    • cat urls.txt | anew unique_urls.txt

Workflow 7: Search Engine Reconnaissance

AI Prompt:

"Use search engines to discover exposed assets for target.com"

Execution Flow:

  1. Multi-Engine Search

    • uncover -q "target.com" -e shodan,censys,fofa

    • shosubgo -d target.com -s SHODAN_KEY

  2. Result Processing

    • cat results.txt | httpx -title -status-code

    • cat results.txt | naabu -top-ports 100

  3. Notification

    • echo "Scan complete!" | notify -provider slack


๐Ÿ› ๏ธ Tool Categories

๐Ÿ” Reconnaissance & Subdomain Enumeration

Subfinder

  • Purpose: Fast subdomain discovery using passive sources

  • Usage: subfinder -d example.com

  • Features: Multiple data sources, fast execution, JSON output

Sublister (Sublist3r)

  • Purpose: Subdomain enumeration using OSINT techniques

  • Usage: sublist3r -d example.com

  • Features: Search engine enumeration, brute force capability

OWASP Amass

  • Purpose: Network mapping and attack surface discovery

  • Usage: amass enum -d example.com

  • Features: Active/passive enumeration, DNS resolution

Assetfinder

  • Purpose: Find domains and subdomains related to a given domain

  • Usage: assetfinder example.com

  • Features: Simple, fast, effective for basic enumeration

๐ŸŽฏ Subdomain Takeover Detection

Subzy

  • Purpose: Check for subdomain takeover vulnerabilities

  • Usage: subzy run --targets subdomains.txt

  • Features: Multiple service detection, verification capabilities

Subjack

  • Purpose: Subdomain takeover vulnerability scanner

  • Usage: subjack -w subdomains.txt

  • Features: Fast scanning, custom fingerprints

๐ŸŒ HTTP Analysis & Probing

Httpx

  • Purpose: Fast HTTP toolkit for probing services

  • Usage: httpx -l subdomains.txt -title -tech-detect

  • Features: Technology detection, screenshot capture, custom headers

Katana

  • Purpose: Next-generation web crawler

  • Usage: katana -u https://example.com -depth 3

  • Features: JavaScript parsing, deep crawling, URL extraction

GoSpider

  • Purpose: Fast web spider for crawling websites

  • Usage: gospider -s https://example.com

  • Features: Concurrent crawling, link extraction

๐Ÿ“ Content & Directory Discovery

Ffuf

  • Purpose: Fast web fuzzer (Fuzz Faster U Fool)

  • Usage: ffuf -u https://example.com/FUZZ -w wordlist.txt

  • Features: Multiple fuzzing modes, filtering options, high performance

Feroxbuster

  • Purpose: Fast content discovery tool

  • Usage: feroxbuster -u https://example.com

  • Features: Recursive scanning, wildcard detection

Dirsearch

  • Purpose: Web path scanner

  • Usage: dirsearch -u https://example.com -e php,html,js

  • Features: Multiple extensions, threading, reporting

๐Ÿ›ก๏ธ Vulnerability Scanning

Nuclei

  • Purpose: Fast vulnerability scanner with community templates

  • Usage: nuclei -u https://example.com -t cves,exposures

  • Features: Template-based scanning, community templates, high accuracy

Nikto

  • Purpose: Web server scanner

  • Usage: nikto -h https://example.com

  • Features: Comprehensive checks, plugin system

DalFox

  • Purpose: XSS scanner and parameter analysis tool

  • Usage: dalfox url https://example.com/search?q=test

  • Features: Advanced XSS detection, parameter analysis

๐Ÿ”— Parameter & URL Discovery

Arjun

  • Purpose: HTTP parameter discovery suite

  • Usage: arjun -u https://example.com

  • Features: Multiple methods, custom wordlists

ParamSpider

  • Purpose: Parameter mining from web archives

  • Usage: paramspider -d example.com

  • Features: Archive mining, parameter extraction

Waybackurls

  • Purpose: Fetch URLs from Wayback Machine

  • Usage: echo "example.com" | waybackurls

  • Features: Historical URL discovery

Gau (Get All URLs)

  • Purpose: Get All URLs from multiple sources

  • Usage: echo "example.com" | gau

  • Features: Multiple data sources, comprehensive coverage

๐Ÿ” Port Scanning & Network Discovery

Nmap

  • Purpose: Network discovery and security auditing

  • Usage: nmap -sCV target.com

  • Features: Service detection, OS fingerprinting, script engine

Masscan

  • Purpose: High-speed port scanner

  • Usage: masscan 192.168.1.0/24 -p1-65535 --rate=1000

  • Features: Extremely fast, large-scale scanning

RustScan

  • Purpose: Modern fast port scanner

  • Usage: rustscan -a 192.168.1.1

  • Features: Fast scanning, Nmap integration

Naabu

  • Purpose: Fast port scanner written in Go

  • Usage: naabu -host example.com

  • Features: SYN/CONNECT scan, fast enumeration, Nmap integration

๐ŸŒ DNS Enumeration & Resolution

DNSx

  • Purpose: Fast and multi-purpose DNS toolkit

  • Usage: echo "example.com" | dnsx -resp

  • Features: DNS resolution, wildcard filtering, multiple record types

ShuffleDNS

  • Purpose: Wrapper around massdns for DNS bruteforcing

  • Usage: shuffledns -d example.com -w wordlist.txt

  • Features: Active bruteforce, wildcard handling, fast resolution

PureDNS

  • Purpose: Fast domain resolver and subdomain bruteforcing

  • Usage: puredns bruteforce wordlist.txt example.com

  • Features: Accurate resolution, wildcard detection, bruteforce

Alterx

  • Purpose: Fast and customizable subdomain wordlist generator

  • Usage: echo "example.com" | alterx

  • Features: Pattern-based generation, permutation engine

๐Ÿ” TLS/SSL & Certificate Analysis

TLSx

  • Purpose: Fast TLS data grabber with support for multiple TLS probes

  • Usage: echo "example.com" | tlsx

  • Features: Certificate extraction, cipher enumeration, version detection

๐Ÿ”Ž Search Engine Integration

Uncover

  • Purpose: Discover exposed hosts using multiple search engines

  • Usage: uncover -q "example.com" -e shodan,censys

  • Features: Multi-engine support (Shodan, Censys, Fofa), API integration

Shosubgo

  • Purpose: Subdomain enumeration using Shodan API

  • Usage: shosubgo -d example.com -s API_KEY

  • Features: Shodan integration, fast enumeration

Chaos

  • Purpose: Subdomain discovery using ProjectDiscovery's Chaos dataset

  • Usage: chaos -d example.com

  • Features: Passive enumeration, large dataset

๐Ÿ”ง Utility & Helper Tools

Notify

  • Purpose: Stream output to multiple platforms

  • Usage: echo "Alert!" | notify -provider slack

  • Features: Multiple providers (Slack, Discord, Telegram), custom webhooks

Interactsh

  • Purpose: OOB interaction gathering server and client

  • Usage: interactsh-client

  • Features: DNS/HTTP/SMTP interactions, SSRF detection

CRLFuzz

  • Purpose: Fast CRLF injection scanner

  • Usage: crlfuzz -u https://example.com

  • Features: CRLF detection, header injection testing

Qsreplace

  • Purpose: Query string parameter replacement

  • Usage: cat urls.txt | qsreplace "FUZZ"

  • Features: Parameter manipulation, fuzzing preparation

Anew

  • Purpose: Append unique lines to files

  • Usage: cat new.txt | anew existing.txt

  • Features: Deduplication, append-only mode

Unfurl

  • Purpose: URL parsing and extraction

  • Usage: cat urls.txt | unfurl domains

  • Features: Component extraction (domains, paths, params)

๐Ÿ•ท๏ธ Advanced Web Crawling

Hakrawler

  • Purpose: Fast web crawler for gathering URLs and JavaScript files

  • Usage: echo "https://example.com" | hakrawler

  • Features: JS file discovery, depth control, fast crawling

Gauplus

  • Purpose: Enhanced version of gau with additional features

  • Usage: echo "example.com" | gauplus

  • Features: Multiple sources, filtering, enhanced output

๐Ÿ” Subdomain Discovery (Advanced)

GitHub Subdomains

  • Purpose: Find subdomains from GitHub

  • Usage: github-subdomains -d example.com -t TOKEN

  • Features: GitHub code search, token-based auth

๐ŸŒ Network & Infrastructure

Mapcidr

  • Purpose: Utility for manipulating CIDR ranges

  • Usage: echo "192.168.1.0/24" | mapcidr

  • Features: CIDR expansion, aggregation, filtering

CDNCheck

  • Purpose: Identify CDN/WAF services

  • Usage: echo "example.com" | cdncheck

  • Features: CDN detection, WAF identification

ASNmap

  • Purpose: ASN to CIDR lookup and enumeration

  • Usage: asnmap -a AS15169

  • Features: ASN enumeration, CIDR mapping, organization lookup


๐Ÿ“‹ Complete Tool List (55+ Tools)

Reconnaissance & Enumeration (15 tools)

  1. Subfinder - Subdomain discovery using passive sources

  2. Sublister - OSINT-based subdomain enumeration

  3. Amass - Network mapping and attack surface discovery

  4. Assetfinder - Find domains and subdomains

  5. DNSx - Fast DNS toolkit with multiple features

  6. ShuffleDNS - DNS bruteforcing wrapper

  7. PureDNS - Fast domain resolver and bruteforcer

  8. Alterx - Subdomain wordlist generator

  9. GitHub Subdomains - Find subdomains from GitHub

  10. Shosubgo - Shodan-based subdomain discovery

  11. Chaos - ProjectDiscovery's Chaos dataset

  12. Uncover - Multi-engine search (Shodan, Censys, Fofa)

  13. ASNmap - ASN to CIDR lookup

  14. Mapcidr - CIDR manipulation utility

  15. Enum4linux - SMB/Windows enumeration

Subdomain Takeover (2 tools)

  1. Subzy - Subdomain takeover vulnerability scanner

  2. Subjack - Subdomain takeover tool

HTTP Analysis & Probing (3 tools)

  1. Httpx - Fast HTTP toolkit with tech detection

  2. TLSx - TLS/SSL certificate analysis

  3. CDNCheck - CDN/WAF identification

Web Crawling & Spidering (4 tools)

  1. Katana - Next-generation web crawler

  2. GoSpider - Fast web spider

  3. Hakrawler - Fast URL and JS file gatherer

  4. Waybackurls - Fetch URLs from Wayback Machine

  5. Gau - Get All URLs from multiple sources

  6. Gauplus - Enhanced version of gau

Content Discovery (5 tools)

  1. Ffuf - Fast web fuzzer

  2. Feroxbuster - Fast content discovery

  3. Dirsearch - Web path scanner

  4. Gobuster - Directory/DNS/VHost bruteforcer

  5. Dirb - Web content scanner

Vulnerability Scanning (4 tools)

  1. Nuclei - Template-based vulnerability scanner

  2. Nikto - Web server scanner

  3. DalFox - XSS scanner and parameter analyzer

  4. CRLFuzz - CRLF injection scanner

Parameter Discovery (3 tools)

  1. Arjun - HTTP parameter discovery

  2. ParamSpider - Parameter mining from archives

  3. Qsreplace - Query string parameter replacement

Port Scanning (4 tools)

  1. Nmap - Network discovery and security auditing

  2. Masscan - High-speed port scanner

  3. RustScan - Modern fast port scanner

  4. Naabu - Fast port scanner in Go

Exploitation & Testing (4 tools)

  1. SQLMap - SQL injection detection and exploitation

  2. Metasploit - Penetration testing framework

  3. Hydra - Network logon cracker

  4. John - Password cracker

Specialized Tools (5 tools)

  1. WPScan - WordPress security scanner

  2. Interactsh - OOB interaction server

  3. Notify - Multi-platform notification tool

  4. GF - Wrapper around grep for patterns

Utility Tools (5 tools)

  1. Anew - Append unique lines to files

  2. Unfurl - URL parsing and extraction

  3. Generic Command - Execute any shell command


๐ŸŽจ Advanced Examples

Example 1: Complete Bug Bounty Reconnaissance

Scenario: You're testing target.com for a bug bounty program.

AI Conversation:

You: "I'm starting a bug bounty assessment on target.com. Perform comprehensive reconnaissance including subdomain enumeration, HTTP probing, content discovery, and vulnerability scanning. Focus on finding high-impact vulnerabilities." AI: I'll perform a comprehensive bug bounty reconnaissance on target.com. Let me start with subdomain enumeration using multiple tools for maximum coverage. [Executes subfinder, sublister, amass, assetfinder] Found 127 unique subdomains. Now probing for live HTTP services... [Executes httpx with technology detection] Discovered 89 live HTTP services. Interesting findings: - admin.target.com (Apache 2.4.41) - api.target.com (Nginx 1.18.0) - dev.target.com (GitHub Pages - potential takeover!) Let me check for subdomain takeovers... [Executes subzy and subjack] ๐Ÿšจ CRITICAL: dev.target.com is vulnerable to subdomain takeover via GitHub Pages! Now performing content discovery on high-value targets... [Executes ffuf, feroxbuster on key subdomains] Found several interesting endpoints: - admin.target.com/backup/ (403 Forbidden) - api.target.com/v1/users (200 OK) - api.target.com/swagger.json (200 OK) Running vulnerability scans... [Executes nuclei with comprehensive templates] ๐Ÿšจ HIGH: SQL injection detected on api.target.com/v1/search ๐Ÿšจ MEDIUM: XSS vulnerability on blog.target.com/search ๐Ÿšจ LOW: Information disclosure via server headers Summary of findings: 1. Subdomain takeover: dev.target.com 2. SQL injection: api.target.com/v1/search 3. XSS: blog.target.com/search 4. Exposed API documentation: api.target.com/swagger.json 5. Backup directory: admin.target.com/backup/ Recommended next steps: 1. Exploit the subdomain takeover for maximum impact 2. Test the SQL injection for data extraction 3. Verify XSS exploitability 4. Analyze API documentation for additional endpoints

Example 2: CTF Web Challenge Solution

Scenario: You have a CTF web challenge at http://ctf.example.com:8080

AI Conversation:

You: "I have a CTF web challenge at http://ctf.example.com:8080. Help me find the flag by analyzing the application, finding hidden content, and testing for vulnerabilities." AI: I'll help you solve this CTF challenge systematically. Let me start by crawling the application to understand its structure. [Executes katana and gospider] Application structure discovered: - /login (login form) - /register (registration form) - /dashboard (requires authentication) - /admin (403 Forbidden) - /robots.txt (found!) Let me check robots.txt and perform content discovery... [Executes httpx to fetch robots.txt, then ffuf for hidden directories] robots.txt reveals: - /secret_backup/ - /dev_notes.txt Content discovery found: - /.git/ (exposed Git repository!) - /backup.sql (database backup) - /config.php.bak (backup config file) ๐Ÿšจ CRITICAL: Exposed .git repository detected! Let me extract the Git repository and analyze the source code... [Executes git dumper equivalent via custom command] Source code analysis reveals: - SQL injection in login form (username parameter) - Hardcoded admin credentials in config.php.bak - Flag location: /admin/flag.txt Let me test the SQL injection... [Executes sqlmap] SQL injection confirmed! Database extracted: - Admin username: admin - Admin password hash: 5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 (SHA1 of 'password') Now accessing admin panel with credentials admin:password... [Executes httpx with authentication] Successfully accessed /admin/flag.txt! ๐Ÿ FLAG FOUND: CTF{g1t_r3p0s_4r3_d4ng3r0us_wh3n_3xp0s3d} Solution summary: 1. Crawled application structure 2. Found exposed .git repository via content discovery 3. Extracted source code revealing vulnerabilities 4. Exploited SQL injection to extract credentials 5. Used hardcoded credentials to access admin panel 6. Retrieved flag from /admin/flag.txt

๐Ÿ”ง Troubleshooting

Common Installation Issues

Tool Not Found Errors

# Check if tool is installed which subfinder which nuclei # Verify PATH includes Go binaries echo $PATH | grep go # Manually add to PATH export PATH=$PATH:/usr/local/go/bin:$HOME/go/bin # Make permanent echo 'export PATH=$PATH:/usr/local/go/bin:$HOME/go/bin' >> ~/.bashrc source ~/.bashrc

Permission Denied Errors

# Fix script permissions chmod +x install_tools.sh # Fix tool permissions sudo chmod +x /usr/local/bin/subfinder sudo chmod +x /usr/local/bin/nuclei # Check tool ownership ls -la /usr/local/bin/ | grep subfinder

Common Runtime Issues

Tool Execution Timeouts

# Default timeout in kali_server.py COMMAND_TIMEOUT = 600 # 10 minutes default # Long-running tools (nuclei, amass, masscan, nmap, ffuf, feroxbuster) get 15 minutes # Or use additional_args for tool-specific timeouts nuclei_scan(target="example.com", additional_args="--timeout 120")

Rate Limiting Issues

# Add delays to avoid rate limiting subfinder_scan(domain="example.com", additional_args="--rate-limit 10") httpx_scan(target="urls.txt", additional_args="--rate-limit 100")

Health Check and Diagnostics

Server Health Check

# Use the health endpoint server_health() # Expected response: { "status": "healthy", "message": "Kali Linux Tools API Server is running", "tools_status": { "nmap": true, "subfinder": true, "nuclei": false, # Not installed ... }, "all_essential_tools_available": false }

๐Ÿ“š API Reference

Health Endpoint

GET /health

Response:

{ "status": "healthy", "message": "Kali Linux Tools API Server is running", "tools_status": { "nmap": true, "subfinder": true, "nuclei": true }, "all_essential_tools_available": true }

Tool Execution Endpoints

Subdomain Enumeration

POST /api/tools/subfinder Content-Type: application/json { "domain": "example.com", "additional_args": "-sources censys,shodan" }

Vulnerability Scanning

POST /api/tools/nuclei Content-Type: application/json { "target": "https://example.com", "templates": "cves,exposures", "additional_args": "-severity critical,high" }

๐Ÿ“ Credits & License

Author Information

Author: LAKSHMIKANTHAN K (letchupkt)
Enhanced Version: Bug Hunting Arsenal Integration
ยฉ 2025 LAKSHMIKANTHAN K (letchupkt)

Acknowledgments

  • Original MCP Framework: Anthropic and the MCP community

  • Security Tools: Individual tool developers and maintainers

  • Inspiration: Various open-source security projects and researchers

  • Testing: Bug bounty community and ethical hackers

License

This project is released under the MIT License. See LICENSE file for details.


โš ๏ธ Legal Disclaimer

Important Notice

This project is intended solely for educational and ethical testing purposes. Any misuse of the information or tools provided โ€” including unauthorized access, exploitation, or malicious activity โ€” is strictly prohibited.

Responsible Use

  • โœ… Only test systems you own or have explicit written permission to test

  • โœ… Respect scope limitations defined in testing agreements

  • โœ… Follow responsible disclosure for any vulnerabilities found

  • โœ… Comply with local laws and regulations regarding security testing

  • โœ… Use appropriate rate limiting to avoid service disruption

Liability

The author assumes no responsibility for misuse of this software. Users are solely responsible for ensuring their activities comply with applicable laws and regulations.

Always ensure you have proper authorization before testing any systems.


Happy Bug Hunting! ๐ŸŽฏ

Remember: With great power comes great responsibility. Use these tools ethically and legally.

ยฉ 2025 LAKSHMIKANTHAN K (letchupkt) - MCP Kali Server

๐Ÿ“ž Support and Contact

๐Ÿ”— GitHub Repository

  • Main Repository: https://github.com/letchupkt/kali-mcp

  • Issues & Bug Reports: https://github.com/letchupkt/kali-mcp/issues

  • Feature Requests: https://github.com/letchupkt/kali-mcp/issues/new

  • Discussions: https://github.com/letchupkt/kali-mcp/discussions

๐Ÿค Getting Help

  • GitHub Issues: Report bugs or request features at https://github.com/letchupkt/kali-mcp/issues

  • Documentation: Check this comprehensive README and inline code comments

  • Community: Join security-focused Discord servers and forums

  • Email: Contact LAKSHMIKANTHAN K (letchupkt) for direct support

๐Ÿš€ Feature Requests

Have ideas for new tools or improvements? We'd love to hear them!

  1. Check existing issues: https://github.com/letchupkt/kali-mcp/issues

  2. Provide detailed use cases and requirements

  3. Consider contributing the implementation

๐Ÿค Contributing

Contributions are welcome! Please:

  1. Fork the repository: https://github.com/letchupkt/kali-mcp

  2. Create a feature branch: git checkout -b feature/amazing-feature

  3. Commit your changes: git commit -m 'Add amazing feature'

  4. Push to the branch: git push origin feature/amazing-feature

  5. Submit a pull request with detailed description

  6. Ensure all tests pass and tools are properly integrated

๐Ÿ› Security Issues

Found a security vulnerability in the tool itself?

  • DO NOT open a public issue

  • Contact LAKSHMIKANTHAN K (letchupkt) directly for responsible disclosure

  • Provide detailed reproduction steps and impact assessment

๐Ÿ“Š Project Stats

  • 55+ Security Tools integrated

  • 3 AI Interface Methods supported

  • Cross-Platform compatibility

  • Active Development and maintenance


๐ŸŒŸ Star History

If you find this project useful, please consider giving it a star on GitHub!

Star History Chart


๐Ÿ”„ Updates and Roadmap

Recent Updates

  • โœ… MCP server with 55+ security tools

  • โœ… Added 30+ new tools including DNSx, Naabu, TLSx, Uncover, and more

  • โœ… Direct Ollama integration

  • โœ… Comprehensive documentation

  • โœ… Automated installation script

  • โœ… Advanced workflow examples

Upcoming Features

  • ๐Ÿ”„ Web-based dashboard interface

  • ๐Ÿ”„ Docker containerization

  • ๐Ÿ”„ Additional AI model integrations

  • ๐Ÿ”„ Real-time collaboration features

  • ๐Ÿ”„ Advanced reporting and analytics

Version History

  • v2.0.0 - Enhanced Bug Hunting Arsenal (Current)

  • v1.0.0 - Initial MCP Kali Server release


๐ŸŽฏ Happy Bug Hunting!

Remember: With great power comes great responsibility. Use these tools ethically and legally.

๐Ÿ”— Repository: https://github.com/letchupkt/kali-mcp
๐Ÿ‘จโ€๐Ÿ’ป Author: LAKSHMIKANTHAN K (letchupkt)
ยฉ 2024 LAKSHMIKANTHAN K (letchupkt) - MCP Kali Server

-
security - not tested
A
license - permissive license
-
quality - not tested

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/letchupkt/kali-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server