Cover image
awsome_kali_mcpServers
Public

awsome_kali_mcpServers

Try Now
2025-04-08

Awsome Kali McPservers ist eine Reihe von MCP -Servern, die auf Kali Linux zugeschnitten sind und die AI -Agenten bei Reverse Engineering und Sicherheitstests befähigen sollen. Es bietet flexible Netzwerkanalysen, Zielschnüffeln, Verkehrsanalyse, binäres Verständnis und Automatisierung, was die kI-gesteuerten Workflows verbessert.

3 years

Works with Finder

1

Github Watches

1

Github Forks

98

Github Stars

awsome-kali-MCPServers

Overview

Welcome to awsome-kali-MCPServers! This repository is a collection of Model Context Protocol (MCP) servers designed specifically for Kali Linux environments. The goal is to enhance reverse engineering, security testing, and automation workflows by integrating powerful tools and flexible features. Whether you're a security researcher or a developer, this project aims to streamline your tasks with Kali Linux.

Quick Start

Follow these steps to quickly get started with kali-mcps:

  1. Build the Docker Image First, build the Docker image, temporarily named kali-mcps. Run the following command in the project root directory:
docker build -t kali-mcps:latest .
  1. Launch an MCP Client Ensure you have an MCP client installed, such as claude desktop, cline, goose, or roo code. Open your chosen MCP client.
  2. Configure the MCP Client In your MCP client, create a configuration file (e.g., config.json) with the following content:
{
  "mcpServers": {
    "kali-docker": {
      "command": "docker",
      "args": ["run", "-i", "kali-mcps:latest"]
    }
  }
}
  • "kali-docker" is the server name, which you can customize.
  • "command": "docker" specifies that Docker will be used to run the container.
  • "args" defines the Docker run parameters: -i enables interactive mode, and kali-mcps:latest is the image you just built.
  1. Use Kali Tools Once configured, connect to the kali-mcps container via the MCP client and start using the built-in Kali tools (e.g., Nmap, nm, objdump, strings, tshark) for your tasks. Examples include:
  • Run basic_scan for basic network scanning.
  • Run disassemble to disassemble a target file.
  • Run capture_live to capture real-time network traffic.

image

What to Expect

Network Analysis: Tools for sniffing and analyzing traffic. Binary Understanding: Support for reverse engineering and function analysis. Automation: Scripts and servers to simplify repetitive tasks.

New Features

Since the last update, we have added the following features, integrating a series of tools based on the FastMCP framework:

1. Network Scanning (Nmap)

  • basic_scan: Basic network scanning.
  • intense_scan: In-depth network scanning.
  • stealth_scan: Stealth network scanning.
  • quick_scan: Quick network scanning.
  • vulnerability_scan: Vulnerability scanning.

2. Symbol Analysis (nm)

  • basic_symbols: Lists basic symbols.
  • dynamic_symbols: Lists dynamic symbols.
  • demangle_symbols: Decodes symbols.
  • numeric_sort: Sorts symbols numerically.
  • size_sort: Sorts symbols by size.
  • undefined_symbols: Lists undefined symbols.

3. Binary Analysis (objdump)

  • file_headers: Lists file headers.
  • disassemble: Disassembles the target file.
  • symbol_table: Lists the symbol table.
  • section_headers: Lists section headers.
  • full_contents: Lists full contents.

4. String Extraction (strings)

  • basic_strings: Basic string extraction.
  • min_length_strings: Extracts strings with a specified minimum length.
  • offset_strings: Extracts strings with offsets.
  • encoding_strings: Extracts strings based on encoding.

5. Network Traffic Analysis (Wireshark/tshark)

  • capture_live: Captures network traffic in real-time.
  • analyze_pcap: Analyzes pcap files.
  • extract_http: Extracts HTTP data.
  • protocol_hierarchy: Lists protocol hierarchy.
  • conversation_statistics: Provides conversation statistics.
  • expert_info: Analyzes expert information.

6. Sandbox Support (Docker)

A new sandbox feature has been added, enabling secure command execution in an isolated container environment:

Runs commands using Docker containers, with the default image being ubuntu-systemd:22.04. Configurable memory limit (default: 2GB), CPU limit (default: 1 core), network mode, and timeout duration. Supports bidirectional file copying between the host and the container. Automatically cleans up container resources.

TODO

  • Docker Sandbox Support: Add containerized environments for safe testing and execution.
  • Network Tools Integration: Support for tools like Nmap and Wireshark for advanced network analysis.
  • Reverse Engineering Tools: Integrate Ghidra and Radare2 for enhanced binary analysis.
  • Agent Support: Enable agent-based functionality for distributed tasks or remote operations.

Current Status

This project is still in its early stages. I’m working on preparing the content, including server configurations, tool integrations, and documentation. Nothing is fully ready yet, but stay tuned—exciting things are coming soon!

Stay Updated

Feel free to star or watch this repository to get updates as I add more features and files. Contributions and suggestions are welcome once the groundwork is laid out.

相关推荐

  • NiKole Maxwell
  • I craft unique cereal names, stories, and ridiculously cute Cereal Baby images.

  • Joshua Armstrong
  • Confidential guide on numerology and astrology, based of GG33 Public information

  • https://suefel.com
  • Latest advice and best practices for custom GPT development.

  • Emmet Halm
  • Converts Figma frames into front-end code for various mobile frameworks.

  • Elijah Ng Shi Yi
  • Advanced software engineer GPT that excels through nailing the basics.

  • Yasir Eryilmaz
  • AI scriptwriting assistant for short, engaging video content.

  • Daren White
  • A supportive coach for mastering all Spanish tenses.

  • J. DE HARO OLLE
  • Especialista en juegos de palabras en varios idiomas.

  • albert tan
  • Japanese education, creating tailored learning experiences.

  • https://maiplestudio.com
  • Find Exhibitors, Speakers and more

  • apappascs
  • Entdecken Sie die umfassendste und aktuellste Sammlung von MCP-Servern auf dem Markt. Dieses Repository dient als zentraler Hub und bietet einen umfangreichen Katalog von Open-Source- und Proprietary MCP-Servern mit Funktionen, Dokumentationslinks und Mitwirkenden.

  • pontusab
  • Die Cursor & Windsurf -Community finden Regeln und MCPs

  • av
  • Führen Sie mühelos LLM -Backends, APIs, Frontends und Dienste mit einem Befehl aus.

  • 1Panel-dev
  • 🔥 1Panel bietet eine intuitive Weboberfläche und einen MCP -Server, um Websites, Dateien, Container, Datenbanken und LLMs auf einem Linux -Server zu verwalten.

  • GeyserMC
  • Eine Bibliothek für Kommunikation mit einem Minecraft -Client/Server.

  • Mintplex-Labs
  • Die All-in-One-Desktop & Docker-AI-Anwendung mit integriertem Lappen, AI-Agenten, No-Code-Agent Builder, MCP-Kompatibilität und vielem mehr.

  • awslabs
  • AWS MCP -Server - Spezielle MCP -Server, die AWS -Best Practices direkt in Ihren Entwicklungsworkflow bringen

    Reviews

    4 (1)
    Avatar
    user_2SwnVGw5
    2025-04-16

    As a loyal user of the mysql-mcp-server by Mineru98, I can confidently say this server has significantly boosted performance and reliability for my projects. The seamless integration and comprehensive support make it a standout choice. Visit https://mcp.so/server/mysql-mcp-server/Mineru98 to explore this outstanding product.