๐Ÿ‰ Kali MCP Server

The Kali Linux MCP Server is a specialized implementation of the Model Context Protocol (MCP). It allows AI agents like Claude Desktop, Cursor, and GitHub Copilot to natively “speak” to Kali Linux. Instead of copy-pasting terminal output, your AI assistant can now autonomously run Nmap scans, perform WHOIS lookups, fuzz directories, and interface with the Metasploit Framework in real-time.


๐Ÿ”— Quick Links

ResourceLocation
Source CodeGitHub Repository
Docker ImageDocker Hub Registry
SDK FoundationFastMCP Python SDK

โœจ Key Features

  • ๐ŸŽฏ Professional Tooling: Access 21+ industry-standard tools for Reconnaissance, Scanning, Web Security, Password Cracking, and Exploitation.
  • ๐Ÿ“ฆ Zero-Config Containerization: Use our pre-built Docker image to run a full Kali environment on Windows, macOS, or Linux without polluting your host system.
  • โšก Native Integration: Built on the official MCP Python SDK using stdio transport for instant compatibility with AI IDEs (Cursor, VS Code) and Claude Desktop.
  • ๐Ÿ›ก๏ธ Automated Isolation: Features an automated build process that handles complex dependencies like the Metasploit Framework and rockyou.txt wordlists out of the box.

๐Ÿ“บ See it in Action

Explore how AI agents handle real-world security tasks using this server.

Hash Crack

image

Vulnerability Scan

 Autonomous Vulnerability Scanning with GitHub Copilot & Kali MCP Server

๐Ÿš€ Getting Started

Method 1: Docker (Recommended)

The “Gold Standard” for security tools. This ensures all dependencies and wordlists are ready to go.

  1. Pull the Image:
docker pull cyberillo/kali-mcp-server:latest
  1. Test the Connection:
docker run -i --rm kali-mcp-server

Method 2: Local Python Execution

Best for developers already running Kali Linux as their primary OS.

  1. Clone & Setup:
git clone https://github.com/cyberillo/kali-mcp-server.git
cd kali-mcp-server
python3 -m venv venv && source venv/bin/activate
pip install mcp
  1. Launch:
python3 kali-mcp-server.py

๐Ÿค– Configure Your AI Client

Claude Desktop

Add this to your claude_desktop_config.json:

"mcpServers": {
  "kali-tools": {
    "command": "docker",
    "args": ["run", "-i", "--rm", "kali-mcp-server"]
  }
}

GitHub Copilot (VS Code)

Update your .vscode/mcp.json:

"servers": {
  "kali-mcp-server": {
    "type": "stdio",
    "command": "docker",
    "args": ["run", "-i", "--rm", "kali-mcp-server"]
  }
}

๐Ÿ› ๏ธ Available Toolset

The server exposes specialized capabilities across the entire penetration testing lifecycle:

CategoryHighlights
Reconwhois, dnsenum, whatweb, amass, netdiscover
Scanningnmap, enum4linux, smbclient
Web Securitysqlmap, nikto, gobuster, dirb, wpscan, ffuf, wfuzz
Crackinghydra, john the ripper, hashcat
Exploitationmetasploit_exploit, searchsploit, tcpdump

๐Ÿ’ก Important Considerations

โš ๏ธ Security & Permissions

  • Privileged Tools: Commands like tcpdump or netdiscover require raw network access. If running via Docker, you may need to add the --privileged flag to your config.
  • Timeouts: Heavy tasks (like a full Metasploit exploit or Nikto scan) have built-in safety timeouts (up to 600s) to prevent the LLM from hanging.

๐Ÿง  Pro-Tip for Prompting

When asking your AI to use Metasploit, instruct it to format options as comma-separated pairs.
Example: Run an exploit on 192.168.1.5 with options RHOSTS=192.168.1.5,LHOST=10.0.0.2


Disclaimer: This tool is for educational and authorized security testing purposes only.

Back to top button