Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@HackBridgescan 10.10.10.10 for open ports and services using nmap"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
š HackBridge
HackBridge is a lightweight MCP (Model Context Protocol) bridge that connects AI clients (e.g., Claude Desktop, 5ire) to a Linux terminal API server ā enabling AI-assisted penetration testing, CTF challenge solving, and automated recon/exploitation in real time.
Run terminal commands like nmap, nxc, sqlmap, or any other tool. Interact with web applications using curl, wget, gobuster. Let the AI drive your offensive security workflow ā from enumeration to exploitation.
š Use Case
HackBridge enables AI-driven offensive security by:
Connecting MCP-compatible AI clients (OpenAI, Claude, DeepSeek, Gemini, etc.) to a Linux terminal.
Exposing a controlled API to execute commands on your Linux machine.
Letting AI suggest, run, and analyze terminal commands to solve CTF challenges or automate recon/exploitation tasks.
Allowing MCP apps to send structured requests (e.g.,
nmap,ffuf,curl) and receive parsed outputs.
š Features
š§ AI Integration via MCP ā Connect your Linux machine to any MCP-compatible client like Claude Desktop or 5ire.
š„ļø Command Execution API ā Controlled API to execute terminal commands on your Linux machine.
š ļø Built-in Tool Support ā Pre-configured endpoints for Nmap, Gobuster, Dirb, SQLMap, Hydra, and WPScan.
šøļø Web Challenge Support ā AI can interact with websites and APIs, capture flags via
curland any other tool.ā±ļø Configurable Timeouts ā Per-tool timeout support to handle long-running scans without interruption.
š Built for Offensive Security ā Ideal for red teamers, bug bounty hunters, and CTF players automating common tasks.
š Arbitrary Command Execution ā Execute any terminal command beyond the built-in tools for maximum flexibility.
š Project Structure
MCP-Kali-Server/
āāā kali_server.py # Flask API server (runs on Linux/Kali)
āāā mcp_server.py # MCP client bridge (connects AI to API server)
āāā mcp-kali-server.json # Example MCP client configuration
āāā requirements.txt # Python dependencies
āāā README.md # This fileš ļø Installation & Setup
Prerequisites
Python 3.8+
pip (Python package manager)
The following Python packages (installed via
requirements.txt):Flask>=3.0.0requests>=2.31.0mcp>=1.0.0
1. On Your Linux Machine (API Server)
Install HackBridge via apt:
sudo apt install hackbridgeOr install manually:
git clone <your-repo-url>
cd MCP-Kali-Server
pip install -r requirements.txt
python3 kali_server.pyCommand Line Options:
--ip <address>ā IP to bind the server to (default:127.0.0.1for localhost only)127.0.0.1ā Local connections only (secure, recommended)0.0.0.0ā Allow connections from any interface (ā ļø very dangerous; use with caution)Specific IP ā Bind to a particular network interface
--port <port>ā Port number (default:5000)--debugā Enable debug mode for verbose logging
Examples:
# Run on localhost only (secure, default)
python3 kali_server.py
# Run on all interfaces (less secure, useful for remote access)
python3 kali_server.py --ip 0.0.0.0
# Run on a specific IP and custom port
python3 kali_server.py --ip 192.168.1.100 --port 8080
# Run with debug mode
python3 kali_server.py --debug2. On Your MCP Client Machine (Can Be Local or Remote)
git clone <your-repo-url>
cd MCP-Kali-Server
pip install -r requirements.txtMCP Client Command Line Options:
--server <url>ā Kali API server URL (default:http://localhost:5000)--timeout <seconds>ā Request timeout in seconds (default:600)--debugā Enable debug logging
If running the client and server on the same machine:
python3 mcp_server.py --server http://127.0.0.1:5000If on separate machines, create an SSH tunnel to your Linux machine, then launch the client:
ssh -L 5000:localhost:5000 user@LINUX_IP
python3 mcp_server.py --server http://127.0.0.1:5000Note: If you're openly hosting the API server on your network (
kali_server.py --ip 0.0.0.0), you don't need the SSH tunnel ā but ā ļø this is highly discouraged for security reasons.
python3 mcp_server.py --server http://LINUX_IP:5000āļø MCP Client Configuration
Claude Desktop
Edit C:\Users\USERNAME\AppData\Roaming\Claude\claude_desktop_config.json:
{
"mcpServers": {
"hackbridge": {
"command": "python3",
"args": [
"/absolute/path/to/mcp_server.py",
"--server",
"http://LINUX_IP:5000/"
],
"timeout": 600
}
}
}5ire Desktop Application
Simply add an MCP server with the command:
python3 /absolute/path/to/mcp_server.py --server http://LINUX_IP:50005ire will automatically generate the needed configuration files.
š§° Supported Tools
Tool | MCP Function | Description |
Nmap |
| Network scanning & version detection |
Gobuster |
| Directory, DNS, and vhost brute-forcing |
Dirb |
| Web content scanning |
SQLMap |
| SQL injection testing |
Hydra |
| Password brute-forcing |
WPScan |
| WordPress vulnerability scanning |
Any command |
| Execute any arbitrary terminal command |
š API Endpoints
The Flask API server (kali_server.py) exposes the following endpoints:
Method | Endpoint | Description |
|
| Execute any arbitrary command |
|
| Run an Nmap scan |
|
| Run a Gobuster scan |
|
| Run a Dirb scan |
|
| Run a SQLMap scan |
|
| Run a Hydra attack |
|
| Run a WPScan scan |
|
| Server health check |
š® Other Possibilities
Since the AI model can now execute commands on the terminal, the possibilities go beyond just pentesting:
Memory Forensics with Volatility ā Automate memory analysis: process enumeration, DLL injection checks, registry extraction from memory dumps.
Disk Forensics with SleuthKit ā Automate disk image analysis, timeline generation, file carving, and hash comparisons.
OSINT & Recon ā Automate recon workflows using tools like
theHarvester,amass,subfinder, etc.Log Analysis ā Parse and analyze security logs, access logs, or system logs.
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.