Kali_Linux_MCP exposes Kali tools through:
- Kali_Linux_Server.py: Flask API wrapping tools like
nmap,gobuster,nikto,sqlmap,metasploit,hydra,john,wpscan,enum4linux. - MCP_Server.py: MCP bridge using FastMCP, forwarding requests from MCP clients to the API.
Use it for authorized labs, CTFs, HTB/THM machines, or AI-assisted testing via MCP clients (Claude Desktop, 5ire, etc.).
- Kali Linux (or Linux with tools installed in PATH).
- Python 3 with
flask,requests,mcp. - Install:
pip install flask requests mcp
-
Start API:
python3 Kali_Linux_Server.py --port 5000 -
Health check:
curl http://localhost:5000/health -
Start MCP bridge:
python3 MCP_Server.py --server http://localhost:5000 --timeout 300
- GET
/health— tool status. - POST
/api/command— run any command. - POST
/api/tools/<tool>— wrappers for nmap, gobuster, dirb, nikto, sqlmap, metasploit, hydra, john, wpscan, enum4linux.
Each requires JSON body with tool-specific args (target, url, etc.).
Bridge registers MCP tools: nmap_scan, gobuster_scan, dirb_scan, nikto_scan, sqlmap_scan, metasploit_run, hydra_attack, john_crack, wpscan_analyze, enum4linux_scan, plus execute_command and check_health.
-
Nmap:
curl -X POST http://localhost:5000/api/tools/nmap -H "Content-Type: application/json" -d '{"target":"scanme.nmap.org","additional_args":"-sV"}' -
WPScan:
curl -X POST http://localhost:5000/api/tools/wpscan -H "Content-Type: application/json" -d '{"url":"https://example.com","additional_args":"--enumerate u"}' -
MCP Client:
Add MCP config pointingpython3 /path/to/MCP_Server.py --server http://LINUX_IP:5000.
- Recon:
nmap_scanto map services. - Web enum:
gobuster_scanordirb_scan. - Vuln triage:
nikto_scan,sqlmap_scan. - WordPress checks:
wpscan_analyze. - SMB recon:
enum4linux_scan. - Credential tests (lab only):
hydra_attack. - Exploit check:
metasploit_run.
- Supports AI-assisted workflows: models suggest and run commands.
- Works with Claude Desktop, 5ire MCP clients.
- Extendable: other forensic tools (Volatility, SleuthKit) possible.