MCP Kali服务器
用于执行Linux终端命令的API桥接器
用于执行Linux终端命令的API桥接器
Kali MCP Server is a lightweight API bridge that connects MCP Clients (e.g: Claude Desktop, 5ire) to the API server which allows excuting commands on a Linux terminal.
This allows the MCP to run terminal commands like nmap
, nxc
or any other tool, interact with web applications using tools like curl
, wget
, gobuster
.
And perform AI-assisted penetration testing, solving CTF web challenge in real time, helping in solving machines from HTB or THM.
👉 How MCP is Revolutionizing Offensive Security
The goal is to enable AI-driven offensive security testing by:
curl
, nmap
, ffuf
, etc.) and receive structured outputs.Here are some example for my testing (I used google's AI gemini 2.0 flash
)
https://github.com/user-attachments/assets/dc93b71d-9a4a-4ad5-8079-2c26c04e5397
https://github.com/user-attachments/assets/3ec06ff8-0bdf-4ad5-be71-2ec490b7ee27
curl
and any other tool AI the needs.git clone https://github.com/Wh0am123/MCP-Kali-Server.git cd MCP-Kali-Server python3 kali_server.py
python3 /absolute/path/to/mcp_server.py http://LINUX_IP:5000
edit (C:\Users\USERNAME\AppData\Roaming\Claude\claude_desktop_config.json)
{ "mcpServers": { "kali_mcp": { "command": "python3", "args": [ "/absolute/path/to/mcp_server.py", "http://LINUX_IP:5000/" ] } } }
python3 /absolute/path/to/mcp_server.py http://LINUX_IP:5000
and it will automatically generate the needed configuration files.There are more possibilites than described since the AI model can now execute commands on the terminal. Here are some example:
Memory forensics using Volatility
Disk forensics with SleuthKit
This project is intended solely for educational and ethical testing purposes. Any misuse of the information or tools provided — including unauthorized access, exploitation, or malicious activity — is strictly prohibited. The author assumes no responsibility for misuse.