Skip to content
gentic.news — AI News Intelligence Platform
Connecting to the Living Graph…

Listen to today's AI briefing

Daily podcast — 5 min, AI-narrated summary of top stories

Claude Code editor interface showing a terminal window with automated Nmap and Metasploit commands running on a Kali…
Open SourceScore: 75

Automate Kali Linux Security Tasks with This New MCP Server

Claude Code users can now automate Kali Linux security tools like Nmap and Metasploit via a new Model Context Protocol server, turning the editor into a security operations hub.

·Apr 2, 2026·3 min read··102 views·AI-Generated·Report error
Share:
Source: news.google.comvia gn_mcp_protocolSingle Source
TL;DR

A new MCP server lets Claude Code directly control Kali Linux tools, enabling automated security workflows from within your editor.

The Technique

A new Model Context Protocol (MCP) server has been developed specifically for Kali Linux. This server exposes Kali's extensive toolkit—including network scanners, vulnerability assessment tools, and exploitation frameworks—as tools that Claude Code can call directly. Instead of manually switching to a terminal, running commands, and parsing output, you can now ask Claude to perform security tasks from within your coding session.

Why It Works

Kali Linux is the de facto operating system for penetration testing and security research, but its power is often locked behind complex, manual command-line workflows. The MCP protocol, which Claude Code uses to integrate with external tools and data sources, provides a perfect bridge. By wrapping Kali's tools in an MCP server, Claude gains structured access to their capabilities. This means Claude can execute a tool, understand its JSON-formatted results, and use that intelligence to plan the next step in a security workflow, all while you stay focused in your editor.

How To Apply It

First, you need to set up the MCP server. The exact installation will depend on the server's repository (a search for "Kali Linux MCP server" should find it). Typically, it involves cloning a repo and adding a configuration block to your Claude Code settings.

Add a configuration to your claude_desktop_config.json:

{
  "mcpServers": {
    "kali-tools": {
      "command": "node",
      "args": ["/path/to/kali-mcp-server/build/index.js"],
      "env": {
        "KALI_TOOLS_PATH": "/usr/bin"
      }
    }
  }
}

Once configured and Claude Code is restarted, the new tools will be available.

Example Prompt for Network Recon:
Instead of running Nmap manually, you can now write:

"@Claude, using the Kali tools, please perform a SYN scan on the target subnet 192.168.1.0/24 to identify live hosts and their open ports. Output the results in a markdown table."

Claude will call the Nmap tool through the MCP server, execute the scan, receive the structured results, and format them for you.

Automating a Workflow:
You can chain tasks. For instance:

  1. Reconnaissance: "Scan example.com for open ports 80 and 443."
  2. Analysis: "Based on the banner from port 80, suggest potential next steps for vulnerability assessment."
  3. Exploitation: "If the server is running Apache 2.4.49, use the Metasploit tool to check for CVE-2021-41773 and provide a proof-of-concept command."

This turns Claude Code into an interactive security partner, capable of orchestrating multi-step penetration tests or security audits without you leaving your development environment.

Key Considerations

  • Safety & Ethics: This tool grants significant power. Use it only on systems you own or have explicit permission to test. Claude's built-in ethical guidelines should help, but the responsibility ultimately lies with you.
  • Tool Context: The MCP server provides the tools, but Claude needs the context to use them wisely. Be specific in your prompts about targets, scan types, and desired output formats.
  • Local Execution: This workflow requires the MCP server and Kali tools to be running on your local machine or an accessible server. It's ideal for local lab environments.
Source: gentic.news · · author= · citation.json

AI-assisted reporting. Generated by gentic.news from multiple verified sources, fact-checked against the Living Graph of 4,300+ entities. Edited by Ala SMITH.

Following this story?

Get a weekly digest with AI predictions, trends, and analysis — free.

AI Analysis

Claude Code users in security or DevOps should immediately evaluate this MCP server. It fundamentally changes how you interact with security tooling. **Change your workflow:** Stop context-switching to a separate Kali VM or terminal for command execution. Frame security tasks as prompts within your Claude Code session. For example, when developing a web app, you can now seamlessly prompt: "Before we deploy, scan the staging server's open ports and check for the OWASP Top 10 using the Kali tools." This integrates security directly into the development lifecycle. **Be specific with prompts:** The MCP server gives Claude access to the tools, not omniscience. Your prompts must be precise. Instead of "check for vulnerabilities," prompt: "Run Nikto against `https://staging.example.com` with the `-Tuning 1,2,3` flag and summarize high-severity findings." Provide the tool name, target, and relevant flags to get accurate, actionable results.
This story is part of
The Agentic Pivot: How Claude Code Is Forcing a Reconfiguration of the AI Stack
Anthropic's developer tool is becoming the connective tissue between models, infrastructure, and autonomous workflows, challenging OpenAI's application-first strategy.
Compare side-by-side
Claude Code vs Kali Linux
Enjoyed this article?
Share:

AI Toolslive

Five one-click lenses on this article. Cached for 24h.

Pick a tool above to generate an instant lens on this article.

Related Articles

From the lab

The framework underneath this story

Every article on this site sits on top of one engine and one framework — both built by the lab.

More in Open Source

View all