Kali Factory MCP Server
Allows scanning GitHub organizations or repositories for leaked credentials and secrets using trufflehog.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Kali Factory MCP Serverrun subdomain enumeration on example.com"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Kali Factory Instructions
Safer host-local control plane for AI agents that need access to Kali Linux OSINT tooling.
This package mirrors the GPU Factory shape — typed job submission with bearer auth, queued worker execution, allowlisted Docker image runs — but applied to a different problem: distributing access to Kali's reconnaissance and traffic-analysis tooling without giving agents an unauthenticated shell.
FastAPI control API
Redis queue
RQ worker
Docker-first container execution against a hardened Kali image
Typed jobs (osint, traffic capture, JS analysis, leak hunting) instead of raw shell
Bearer token auth
Local MCP server for MCP-capable agents
Optional ChromaDB sidecar for retaining recon findings across runs
Why This Exists
Kali ships hundreds of tools, many of which are useful for legitimate competitive intelligence and security research, and some of which are not appropriate for agent-driven automation. The naïve approach — drop an agent into a Kali shell and let it figure things out — produces three problems:
The agent has access to every tool, including exploitation frameworks (
metasploit,sqlmap,hashcat,john,aircrack-ng,exploitdb) that should never be reachable from an automation context.Tool invocations are unstructured shell strings, which is both prone to argument-injection bugs and impossible to audit cleanly.
There is no rate-limit, time-limit, or output-budget on what the agent can do — a single misbehaving agent can hammer a target or fill the disk.
This package solves all three by exposing Kali through a typed-job API where every callable tool is declared in a manifest, every argument is validated by Pydantic, every container run is allowlisted by image prefix, and every call requires a bearer token.
Core Safety Properties
No
shell=TrueNo generic "run whatever command" endpoint
Jobs are validated with explicit schemas
Container execution is allowlisted by image prefix
Tool execution inside the container is allowlisted by binary name
API requires a bearer token
Worker and API are separate processes
Exploitation/credential-cracking/wireless tools explicitly purged at image build
Egress logging on every tool that touches the network
Job Types
kali_probevalidates the Kali container is reachable and the tool allowlist is intact
osint_runexecutes a typed OSINT tool from the allowlist (amass, whatweb, gobuster, dnsenum, etc.) with structured args
traffic_captureruns
mitmdumpfor a bounded duration, returns a capture file
js_analysisruns
linkfinder/secretfinder/arjunagainst a JavaScript URL
leak_scanruns
trufflehogagainst a GitHub org / repo for committed credentials
subdomain_enumruns
amass enum(passive sources only) against a target domain
web_fingerprintruns
whatwebto identify a target's tech stack
nuclei_exposuresruns
nucleiagainst a target with theexposures/template subset onlycves/,vulnerabilities/,default-logins/,fuzzing/template directories are explicitly blocked
Quick Start
Copy environment variables:
cp .env.example .env
./scripts/bootstrap-secrets.shThe API token is stored in:
.secrets/api_tokenand .env points at it through KALI_FACTORY_API_TOKEN_FILE.
Start Redis:
docker compose up -d redisBuild the Kali runtime image:
docker build -t kali-factory/recon:latest runtimes/kali/Create the Python env:
python3 -m venv .venv
source .venv/bin/activate
pip install -e .Run the API:
./scripts/start-api.shRun the worker:
./scripts/start-worker.shRun the MCP server:
./scripts/start-mcp.shExample Requests
Health:
curl http://localhost:8081/healthKali probe:
curl -X POST http://localhost:8081/jobs \
-H "Authorization: Bearer YOUR_TOKEN" \
-H "Content-Type: application/json" \
-d '{"type":"kali_probe"}'Subdomain enumeration:
curl -X POST http://localhost:8081/jobs \
-H "Authorization: Bearer YOUR_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"type":"subdomain_enum",
"domain":"example.com",
"max_runtime_sec": 300
}'Web fingerprint:
curl -X POST http://localhost:8081/jobs \
-H "Authorization: Bearer YOUR_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"type":"web_fingerprint",
"url":"https://example.com"
}'GitHub leak scan:
curl -X POST http://localhost:8081/jobs \
-H "Authorization: Bearer YOUR_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"type":"leak_scan",
"github_org":"example-org"
}'Files
START_HERE_FOR_AGENTS.md— single-entrypoint guide for agents using this control planeruntimes/kali/Dockerfile— Kali container image with the allowlisted tools installedruntimes/kali/tools.json— declarative tool manifest (allowlist + arg templates)scripts/bootstrap-secrets.sh— create and permission-lock the API token filescripts/start-api.sh— launch wrapper for the APIscripts/start-worker.sh— launch wrapper for the workerscripts/start-mcp.sh— launch wrapper for the local MCP serverscripts/install-user-services.sh— install user-level systemd unitssrc/kali_factory/api/— API server (FastAPI)src/kali_factory/worker/— RQ-based job executionsrc/kali_factory/models/— Pydantic job schemassrc/kali_factory/jobs/— per-job-type handlerssrc/kali_factory/policy/— auth, allowlist enforcement, rate limitingsrc/kali_factory/mcp/server.py— stdio MCP adapter over the local Kali Factory APIcompose.yaml— Redis (and optional ChromaDB) sidecarsDockerfile— app container for API/worker.env.example— required settingsDEPLOYMENT.md— host-specific run and service guidance
Recommended Next Hardening
Put the API behind Tailscale, Caddy, or another internal-only gateway
Rotate API tokens
Add audit logging to a file or SQLite
Add explicit job quotas and per-tool rate limits
Add per-target allowlist (only let agents recon domains you own or have authorization to test)
Wire egress logging on the Kali container so every outbound request is captured
Service Model
kali-factory-api.serviceshould run persistentlykali-factory-worker.serviceshould run persistentlythe MCP server should not run as a persistent service
MCP clients should spawn
scripts/start-mcp.shon demand over stdio
Relationship to Other Factory Packages
Factory | Distributes | Job examples |
GPU Factory | CUDA / GPU compute |
|
Kali Factory | OSINT / recon tooling |
|
The two packages share the same architectural shape (FastAPI + Redis + RQ + bearer auth + typed jobs + allowlisted Docker exec) and are designed to coexist on the same host with non-overlapping ports (8080 for GPU Factory, 8081 for Kali Factory).
A future parallel-OS orchestrator can route agent requests to whichever Factory matches the runtime they need.
What Kali Factory Is Not
Not a vulnerability scanner.
nucleiis included but limited toexposures/templates. CVE / exploit / default-login / fuzzing templates are explicitly blocked.Not an exploitation framework. Metasploit, sqlmap, hashcat, john, aircrack-ng, exploitdb, hydra, medusa, ncrack, nikto, wpscan, responder, impacket, crackmapexec are all purged from the runtime image at build time.
Not an unauthorized testing tool. Use only against targets you own or have explicit authorization to test. The API logs every job; misuse is your responsibility.
License
Apache 2.0 (see LICENSE).
This server cannot be installed
Maintenance
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/marcmunoz-uno/Kali-Factory-Instructions'
If you have feedback or need assistance with the MCP directory API, please join our Discord server