Kali MCP Server
Provides access to 20+ Kali Linux penetration testing tools through isolated Docker containers, enabling network scanning, vulnerability assessment, password cracking, web security testing, and forensics through natural language commands.
README
Kali MCP Server 🌟
A powerful MCP (Model Context Protocol) server that provides access to Kali Linux penetration testing tools through Docker containers.
Features
- 🚀 20 Specialized Tools for comprehensive Kali Linux operations
- 🐳 Docker Integration - Runs Kali in isolated containers
- 🔒 Secure Execution - Commands run inside Kali container
- 📦 Easy Installation - Available globally via npm
- 🛠️ Complete Toolkit - All major Kali Linux tool categories
Installation
Global Installation (Recommended)
npm install -g kali-mcp-server
Local Installation
git clone <repository-url>
cd kali-mcp-server
npm install
npm start
MCP Configuration
Add this to your .kilocode/mcp.json or any MCP configuration:
{
"mcpServers": {
"kali": {
"command": "npx",
"args": ["-y", "kali-mcp-server"]
}
}
}
Available Tools (20 Total!)
Core Container Management
run_kali_command- Execute any command inside Kali containerstart_kali_container- Start the Kali containerstop_kali_container- Stop the Kali containerkali_container_status- Check container status
Package Management
install_kali_package- Install Kali packages via aptupdate_kali_system- Update Kali system packages
Network & Service Scanning
kali_network_scan- Network scanning (nmap, masscan)kali_service_scan- Service scanning and enumeration
Information Gathering
kali_information_gathering- OSINT and reconnaissance (whois, dnsrecon, theharvester)
Vulnerability Assessment
kali_vulnerability_scan- Vulnerability scanning (nikto, dirb, gobuster)
Web Application Security
kali_web_scan- Web app testing (sqlmap, dirb, nikto, wpscan)
Password Cracking
kali_password_crack- Password tools (john, hashcat, hydra)
Wireless Tools
kali_wireless_tools- WiFi analysis (airodump-ng, aireplay-ng)
Digital Forensics
kali_forensics- Forensics tools (volatility, autopsy, binwalk)
Exploitation Tools
kali_exploitation- Exploit development (metasploit, searchsploit)
Social Engineering
kali_social_engineering- SE tools (setoolkit, king-phisher)
Reverse Engineering
kali_reverse_engineering- Advanced RE tools (radare2, gdb, strace, ltrace, checksec, patchelf)
Stress Testing
kali_stress_testing- DoS tools (slowloris, torshammer)
Network Sniffing & Spoofing
kali_sniffing_spoofing- Sniffing tools (wireshark, tcpdump, arpspoof)
Universal Command Tool
run_kali_command- Execute any Kali command directly
Use Cases
- Penetration Testing - Complete toolkit in isolated environment
- Network Security - Scanning, sniffing, and spoofing tools
- Web Application Security - SQL injection, directory scanning, vulnerability assessment
- Wireless Security - WiFi analysis and attack tools
- Digital Forensics - Memory analysis, disk forensics, evidence collection
- Password Security - Hash cracking, brute force testing
- Reverse Engineering - Binary analysis, debugging, disassembly, decompilation
- Social Engineering - Phishing, credential harvesting tools
- Vulnerability Research - Exploit development and testing
- Security Training - Learn ethical hacking in safe environment
- CTF Challenges - Complete toolkit for capture the flag competitions
Security Features
- 🔐 Commands execute inside Docker container
- 🛡️ Isolated from host system
- 📝 Full audit trail of executed commands
- 🗑️ Automatic cleanup of containers
Requirements
- Docker installed and running
- Node.js 16+
- Internet connection (for npm packages)
Development
# Clone and setup
git clone <repository-url>
cd kali-mcp-server
npm install
# Run locally
npm start
# Publish to npm (after npm login)
npm publish --access public
License
MIT License - See LICENSE file for details.
Support
For issues and feature requests, please create an issue in the repository.
authors:vasanth, meghana
⚠️ Disclaimer: This tool is for educational and authorized penetration testing only. Ensure you have permission before scanning any networks or systems.
推荐服务器
Baidu Map
百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Playwright MCP Server
一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。
Magic Component Platform (MCP)
一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。
Audiense Insights MCP Server
通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。
VeyraX
一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。
graphlit-mcp-server
模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。
Kagi MCP Server
一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。
e2b-mcp-server
使用 MCP 通过 e2b 运行代码。
Neon MCP Server
用于与 Neon 管理 API 和数据库交互的 MCP 服务器
Exa MCP Server
模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。