Skip to content

Two-component system bridging Kali Linux penetration testing tools with AI agents via MCP. Flask API server executes 10+ security tools (Nmap, SQLMap, Metasploit, etc.) while MCP client provides seamless AI integration for automated security workflows.

License

Notifications You must be signed in to change notification settings

i3T4AN/Kali_Linux_MCP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Kali_Linux_MCP

Overview

Kali_Linux_MCP exposes Kali tools through:

  • Kali_Linux_Server.py: Flask API wrapping tools like nmap, gobuster, nikto, sqlmap, metasploit, hydra, john, wpscan, enum4linux.
  • MCP_Server.py: MCP bridge using FastMCP, forwarding requests from MCP clients to the API.

Use it for authorized labs, CTFs, HTB/THM machines, or AI-assisted testing via MCP clients (Claude Desktop, 5ire, etc.).


Requirements

  • Kali Linux (or Linux with tools installed in PATH).
  • Python 3 with flask, requests, mcp.
  • Install:
    pip install flask requests mcp

Run

  1. Start API:
    python3 Kali_Linux_Server.py --port 5000

  2. Health check:
    curl http://localhost:5000/health

  3. Start MCP bridge:
    python3 MCP_Server.py --server http://localhost:5000 --timeout 300


API Endpoints

  • GET /health — tool status.
  • POST /api/command — run any command.
  • POST /api/tools/<tool> — wrappers for nmap, gobuster, dirb, nikto, sqlmap, metasploit, hydra, john, wpscan, enum4linux.

Each requires JSON body with tool-specific args (target, url, etc.).


MCP Tools

Bridge registers MCP tools: nmap_scan, gobuster_scan, dirb_scan, nikto_scan, sqlmap_scan, metasploit_run, hydra_attack, john_crack, wpscan_analyze, enum4linux_scan, plus execute_command and check_health.


Example Usage


Scenarios

  • Recon: nmap_scan to map services.
  • Web enum: gobuster_scan or dirb_scan.
  • Vuln triage: nikto_scan, sqlmap_scan.
  • WordPress checks: wpscan_analyze.
  • SMB recon: enum4linux_scan.
  • Credential tests (lab only): hydra_attack.
  • Exploit check: metasploit_run.

Notes

  • Supports AI-assisted workflows: models suggest and run commands.
  • Works with Claude Desktop, 5ire MCP clients.
  • Extendable: other forensic tools (Volatility, SleuthKit) possible.

About

Two-component system bridging Kali Linux penetration testing tools with AI agents via MCP. Flask API server executes 10+ security tools (Nmap, SQLMap, Metasploit, etc.) while MCP client provides seamless AI integration for automated security workflows.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages