Provides a bridge to Kali Linux penetration testing tools including nmap, gobuster, and metasploit for security scanning...
Created byMay 24, 2025
MCP Kali Server
Kali MCP Server is a lightweight API bridge that connects MCP Clients (e.g: Claude Desktop, 5ire) to the API server which allows excuting commands on a Linux terminal.
This allows the MCP to run terminal commands like nmap, nxc or any other tool, interact with web applications using tools like curl, wget, gobuster.
And perform AI-assisted penetration testing, solving CTF web challenge in real time, helping in solving machines from HTB or THM.
Configuration for [5ire](https://github.com/nanbingxyz/5ire) Desktop Application:
Simply add an MCP with the command python3 /absolute/path/to/mcp_server.py http://LINUX_IP:5000 and it will automatically generate the needed configuration files.
Other Possibilities
There are more possibilites than described since the AI model can now execute commands on the terminal. Here are some example:
Memory forensics using Volatility
Disk forensics with SleuthKit
Disclaimer:
This project is intended solely for educational and ethical testing purposes. Any misuse of the information or tools provided including unauthorized access, exploitation, or malicious activity is strictly prohibited.
The author assumes no responsibility for misuse.
MCP Kali Server
Kali MCP Server is a lightweight API bridge that connects MCP Clients (e.g: Claude Desktop, 5ire) to the API server which allows excuting commands on a Linux terminal.
This allows the MCP to run terminal commands like nmap, nxc or any other tool, interact with web applications using tools like curl, wget, gobuster.
And perform AI-assisted penetration testing, solving CTF web challenge in real time, helping in solving machines from HTB or THM.
Configuration for [5ire](https://github.com/nanbingxyz/5ire) Desktop Application:
Simply add an MCP with the command python3 /absolute/path/to/mcp_server.py http://LINUX_IP:5000 and it will automatically generate the needed configuration files.
Other Possibilities
There are more possibilites than described since the AI model can now execute commands on the terminal. Here are some example:
Memory forensics using Volatility
Disk forensics with SleuthKit
Disclaimer:
This project is intended solely for educational and ethical testing purposes. Any misuse of the information or tools provided including unauthorized access, exploitation, or malicious activity is strictly prohibited.
The author assumes no responsibility for misuse.