Two-component system bridging Kali Linux penetration testing tools with AI agents via MCP. Flask API server executes 10+ security tools (Nmap, SQLMap, Metasploit, etc.) while MCP client provides seamless AI integration for automated security workflows.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"kali-linux-mcp": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Kali_Linux_MCP exposes Kali tools through: - Kali_Linux_Server.py: Flask API wrapping tools like nmap, gobuster, nikto, sqlmap, metasploit, hydra, john, wpscan, enum4linux. - MCP_Server.py: MCP bridge using FastMCP, forwarding requests from MCP clients to the API.
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Click any tool to inspect its schema.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in security
An evil MCP server used for redteam testing
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
IAM Policy Autopilot is an open source static code analysis tool that helps you quickly create baseline AWS IAM policies that you can refine as your application evolves. This tool is available as a command-line utility and MCP server for use within AI coding assistants for quickly building IAM policies.
Signed receipts for agent, API, and MCP interactions. Portable and offline-verifiable.
MCP Security Weekly
Get CVE alerts and security updates for Kali_Linux_MCP and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Kali_Linux_MCP exposes Kali tools through:
nmap, gobuster, nikto, sqlmap, metasploit, hydra, john, wpscan, enum4linux.Use it for authorized labs, CTFs, HTB/THM machines, or AI-assisted testing via MCP clients (Claude Desktop, 5ire, etc.).
flask, requests, mcp.Start API:
python3 Kali_Linux_Server.py --port 5000
Health check:
curl http://localhost:5000/health
Start MCP bridge:
python3 MCP_Server.py --server http://localhost:5000 --timeout 300
/health — tool status./api/command — run any command./api/tools/<tool> — wrappers for nmap, gobuster, dirb, nikto, sqlmap, metasploit, hydra, john, wpscan, enum4linux.Each requires JSON body with tool-specific args (target, url, etc.).
Bridge registers MCP tools: nmap_scan, gobuster_scan, dirb_scan, nikto_scan, sqlmap_scan, metasploit_run, hydra_attack, john_crack, wpscan_analyze, enum4linux_scan, plus execute_command and check_health.
Nmap:
curl -X POST http://localhost:5000/api/tools/nmap -H "Content-Type: application/json" -d '{"target":"scanme.nmap.org","additional_args":"-sV"}'
WPScan:
curl -X POST http://localhost:5000/api/tools/wpscan -H "Content-Type: application/json" -d '{"url":"https://example.com","additional_args":"--enumerate u"}'
MCP Client:
Add MCP config pointing python3 /path/to/MCP_Server.py --server http://LINUX_IP:5000.
nmap_scan to map services.gobuster_scan or dirb_scan.nikto_scan, sqlmap_scan.wpscan_analyze.enum4linux_scan.hydra_attack.metasploit_run.