# MCP-Kali-Server **Repository Path**: weng-renjun/MCP-Kali-Server ## Basic Information - **Project Name**: MCP-Kali-Server - **Description**: No description available - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2025-12-24 - **Last Updated**: 2025-12-24 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # MCP Kali Server **Kali MCP Server** is a lightweight API bridge that connects MCP Clients (e.g: Claude Desktop, [5ire](https://github.com/nanbingxyz/5ire)) to the API server which allows excuting commands on a Linux terminal. This allows the MCP to run terminal commands like `nmap`, `nxc` or any other tool, interact with web applications using tools like `curl`, `wget`, `gobuster`. And perform **AI-assisted penetration testing**, solving **CTF web challenge** in real time, helping in **solving machines from HTB or THM**. ## My Medium Article on This Tool [](https://yousofnahya.medium.com/how-mcp-is-revolutionizing-offensive-security-93b2442a5096) 👉 [**How MCP is Revolutionizing Offensive Security**](https://yousofnahya.medium.com/how-mcp-is-revolutionizing-offensive-security-93b2442a5096) --- ## 🔍 Use Case The goal is to enable AI-driven offensive security testing by: - Letting the MCP interact with AI endpoints like OpenAI, Claude, DeepSeek, or any other models. - Exposing an API to execute commands on a Kali machine. - Using AI to suggest and run terminal commands to solve CTF challenges or automate recon/exploitation tasks. - Allowing MCP apps to send custom requests (e.g., `curl`, `nmap`, `ffuf`, etc.) and receive structured outputs. Here are some example for my testing (I used google's AI `gemini 2.0 flash`) ### Example solving my web CTF challenge in RamadanCTF https://github.com/user-attachments/assets/dc93b71d-9a4a-4ad5-8079-2c26c04e5397 ### Trying to solve machine "code" from HTB https://github.com/user-attachments/assets/3ec06ff8-0bdf-4ad5-be71-2ec490b7ee27 --- ## 🚀 Features - 🧠 **AI Endpoint Integration**: Connect your kali to any MCP of your liking such as claude desktop or 5ier. - 🖥️ **Command Execution API**: Exposes a controlled API to execute terminal commands on your Kali Linux machine. - 🕸️ **Web Challenge Support**: AI can interact with websites and APIs, capture flags via `curl` and any other tool AI the needs. - 🔐 **Designed for Offensive Security Professionals**: Ideal for red teamers, bug bounty hunters, or CTF players automating common tasks. --- ## 🛠️ Installation and Running ### On your Kali Machine ```bash git clone https://github.com/Wh0am123/MCP-Kali-Server.git cd MCP-Kali-Server pip install -r requirements.txt python3 kali_server.py ``` **Command Line Options:** - `--ip
`: Specify the IP address to bind the server to (default: `127.0.0.1` for localhost only) - Use `127.0.0.1` for local connections only (secure, recommended) - Use `0.0.0.0` to allow connections from any network interface (very dangerous; use with caution) - Use a specific IP address to bind to a particular network interface - `--port