awsome_kali_MCPServers

MCP.Pizza Chef: ccq1

awsome_kali_MCPServers is a collection of MCP servers tailored for Kali Linux, designed to empower AI agents in reverse engineering, security testing, and automation workflows. It provides flexible network analysis, target sniffing, traffic analysis, binary understanding, and automation capabilities, streamlining complex security tasks and enhancing AI-driven workflows in penetration testing and cybersecurity research.

Use This MCP server To

Perform network traffic analysis for security assessments Automate reverse engineering tasks with AI integration Sniff targets and capture data for penetration testing Analyze binaries to identify vulnerabilities Integrate Kali Linux tools with AI agents for testing Streamline security testing workflows using MCP servers Enable AI-driven automation in cybersecurity research Facilitate real-time data collection for threat analysis

README

awsome-kali-MCPServers

Overview

Welcome to awsome-kali-MCPServers! This repository is a collection of Model Context Protocol (MCP) servers designed specifically for Kali Linux environments. The goal is to enhance reverse engineering, security testing, and automation workflows by integrating powerful tools and flexible features. Whether you're a security researcher or a developer, this project aims to streamline your tasks with Kali Linux.

Quick Start

Follow these steps to quickly get started with kali-mcps:

  1. Build the Docker Image First, build the Docker image, temporarily named kali-mcps. Run the following command in the project root directory:
docker build -t kali-mcps:latest .
  1. Launch an MCP Client Ensure you have an MCP client installed, such as claude desktop, cline, goose, or roo code. Open your chosen MCP client.
  2. Configure the MCP Client In your MCP client, create a configuration file (e.g., config.json) with the following content:
{
  "mcpServers": {
    "kali-docker": {
      "command": "docker",
      "args": ["run", "-i", "kali-mcps:latest"]
    }
  }
}
  • "kali-docker" is the server name, which you can customize.
  • "command": "docker" specifies that Docker will be used to run the container.
  • "args" defines the Docker run parameters: -i enables interactive mode, and kali-mcps:latest is the image you just built.
  1. Use Kali Tools Once configured, connect to the kali-mcps container via the MCP client and start using the built-in Kali tools (e.g., Nmap, nm, objdump, strings, tshark) for your tasks. Examples include:
  • Run basic_scan for basic network scanning.
  • Run disassemble to disassemble a target file.
  • Run capture_live to capture real-time network traffic.

image

What to Expect

Network Analysis: Tools for sniffing and analyzing traffic. Binary Understanding: Support for reverse engineering and function analysis. Automation: Scripts and servers to simplify repetitive tasks.

New Features

Since the last update, we have added the following features, integrating a series of tools based on the FastMCP framework:

1. Network Scanning (Nmap)

  • basic_scan: Basic network scanning.
  • intense_scan: In-depth network scanning.
  • stealth_scan: Stealth network scanning.
  • quick_scan: Quick network scanning.
  • vulnerability_scan: Vulnerability scanning.

2. Symbol Analysis (nm)

  • basic_symbols: Lists basic symbols.
  • dynamic_symbols: Lists dynamic symbols.
  • demangle_symbols: Decodes symbols.
  • numeric_sort: Sorts symbols numerically.
  • size_sort: Sorts symbols by size.
  • undefined_symbols: Lists undefined symbols.

3. Binary Analysis (objdump)

  • file_headers: Lists file headers.
  • disassemble: Disassembles the target file.
  • symbol_table: Lists the symbol table.
  • section_headers: Lists section headers.
  • full_contents: Lists full contents.

4. String Extraction (strings)

  • basic_strings: Basic string extraction.
  • min_length_strings: Extracts strings with a specified minimum length.
  • offset_strings: Extracts strings with offsets.
  • encoding_strings: Extracts strings based on encoding.

5. Network Traffic Analysis (Wireshark/tshark)

  • capture_live: Captures network traffic in real-time.
  • analyze_pcap: Analyzes pcap files.
  • extract_http: Extracts HTTP data.
  • protocol_hierarchy: Lists protocol hierarchy.
  • conversation_statistics: Provides conversation statistics.
  • expert_info: Analyzes expert information.

6. Sandbox Support (Docker)

A new sandbox feature has been added, enabling secure command execution in an isolated container environment:

Runs commands using Docker containers, with the default image being ubuntu-systemd:22.04. Configurable memory limit (default: 2GB), CPU limit (default: 1 core), network mode, and timeout duration. Supports bidirectional file copying between the host and the container. Automatically cleans up container resources.

TODO

  • Docker Sandbox Support: Add containerized environments for safe testing and execution.
  • Network Tools Integration: Support for tools like Nmap and Wireshark for advanced network analysis.
  • Reverse Engineering Tools: Integrate Ghidra and Radare2 for enhanced binary analysis.
  • Agent Support: Enable agent-based functionality for distributed tasks or remote operations.

Current Status

This project is still in its early stages. I’m working on preparing the content, including server configurations, tool integrations, and documentation. Nothing is fully ready yet, but stay tuned—exciting things are coming soon!

Stay Updated

Feel free to star or watch this repository to get updates as I add more features and files. Contributions and suggestions are welcome once the groundwork is laid out.

awsome_kali_MCPServers FAQ

How do I deploy awsome_kali_MCPServers?
Build the Docker image using the provided Dockerfile and launch it in your Kali Linux environment.
Which MCP clients are compatible with awsome_kali_MCPServers?
Compatible clients include claude desktop, cline, goose, and roo code.
Can awsome_kali_MCPServers automate penetration testing workflows?
Yes, it integrates AI-driven automation to streamline penetration testing and security analysis.
What kind of data can awsome_kali_MCPServers analyze?
It can analyze network traffic, sniff targets, and understand binary files for vulnerabilities.
Is awsome_kali_MCPServers limited to Kali Linux?
It is specifically designed for Kali Linux to leverage its security tools and environment.
How does awsome_kali_MCPServers enhance AI agent capabilities?
By exposing Kali Linux security tools and data through MCP servers, it enables AI agents to perform complex security tasks.
What are the prerequisites for using awsome_kali_MCPServers?
You need a Kali Linux environment, Docker installed, and an MCP client configured to connect to the servers.
Can awsome_kali_MCPServers be extended with additional tools?
Yes, it is modular and can be extended to include more Kali Linux tools and features.