loading…
Search for a command to run...
loading…
An MCP server that connects AI clients to a Linux terminal for real-time automated penetration testing and CTF challenge solving. It enables AI models to execut
An MCP server that connects AI clients to a Linux terminal for real-time automated penetration testing and CTF challenge solving. It enables AI models to execute terminal commands and interact with offensive security tools like Nmap, SQLMap, and Gobuster.
HackBridge is a lightweight MCP (Model Context Protocol) bridge that connects AI clients (e.g., Claude Desktop, 5ire) to a Linux terminal API server — enabling AI-assisted penetration testing, CTF challenge solving, and automated recon/exploitation in real time.
Run terminal commands like nmap, sqlmap, or any other tool. Interact with web applications using curl, wget, gobuster. Let the AI drive your offensive security workflow — from enumeration to exploitation.
HackBridge enables AI-driven offensive security by:
nmap, ffuf, curl) and receive parsed outputs.curl and any other tool.MCP-Kali-Server/
├── kali_server.py # Flask API server (runs on Linux/Kali)
├── mcp_server.py # MCP client bridge (connects AI to API server)
├── mcp-kali-server.json # Example MCP client configuration
├── requirements.txt # Python dependencies
└── README.md # This file
requirements.txt):Flask>=3.0.0requests>=2.31.0mcp>=1.0.0Install HackBridge via apt:
sudo apt install hackbridge
Or install manually:
git clone <your-repo-url>
cd MCP-Kali-Server
pip install -r requirements.txt
python3 kali_server.py
Command Line Options:
--ip <address> — IP to bind the server to (default: 127.0.0.1 for localhost only)127.0.0.1 — Local connections only (secure, recommended)0.0.0.0 — Allow connections from any interface (⚠️ very dangerous; use with caution)--port <port> — Port number (default: 5000)--debug — Enable debug mode for verbose loggingExamples:
# Run on localhost only (secure, default)
python3 kali_server.py
# Run on all interfaces (less secure, useful for remote access)
python3 kali_server.py --ip 0.0.0.0
# Run on a specific IP and custom port
python3 kali_server.py --ip 192.168.1.100 --port 8080
# Run with debug mode
python3 kali_server.py --debug
git clone <your-repo-url>
cd MCP-Kali-Server
pip install -r requirements.txt
MCP Client Command Line Options:
--server <url> — Kali API server URL (default: http://localhost:5000)--timeout <seconds> — Request timeout in seconds (default: 600)--debug — Enable debug loggingIf running the client and server on the same machine:
python3 mcp_server.py --server http://127.0.0.1:5000
If on separate machines, create an SSH tunnel to your Linux machine, then launch the client:
ssh -L 5000:localhost:5000 user@LINUX_IP
python3 mcp_server.py --server http://127.0.0.1:5000
Note: If you're openly hosting the API server on your network (
kali_server.py --ip 0.0.0.0), you don't need the SSH tunnel — but ⚠️ this is highly discouraged for security reasons.
python3 mcp_server.py --server http://LINUX_IP:5000
Edit C:\Users\USERNAME\AppData\Roaming\Claude\claude_desktop_config.json:
{
"mcpServers": {
"hackbridge": {
"command": "python3",
"args": [
"/absolute/path/to/mcp_server.py",
"--server",
"http://LINUX_IP:5000/"
],
"timeout": 600
}
}
}
Simply add an MCP server with the command:
python3 /absolute/path/to/mcp_server.py --server http://LINUX_IP:5000
5ire will automatically generate the needed configuration files.
| Tool | MCP Function | Description |
|---|---|---|
| Nmap | nmap_scan |
Network scanning & version detection |
| Gobuster | gobuster_scan |
Directory, DNS, and vhost brute-forcing |
| Dirb | dirb_scan |
Web content scanning |
| SQLMap | sqlmap_scan |
SQL injection testing |
| Hydra | hydra_attack |
Password brute-forcing |
| WPScan | wpscan_analyze |
WordPress vulnerability scanning |
| Any command | execute_command |
Execute any arbitrary terminal command |
The Flask API server (kali_server.py) exposes the following endpoints:
| Method | Endpoint | Description |
|---|---|---|
POST |
/api/command |
Execute any arbitrary command |
POST |
/api/tools/nmap |
Run an Nmap scan |
POST |
/api/tools/gobuster |
Run a Gobuster scan |
POST |
/api/tools/dirb |
Run a Dirb scan |
POST |
/api/tools/sqlmap |
Run a SQLMap scan |
POST |
/api/tools/hydra |
Run a Hydra attack |
POST |
/api/tools/wpscan |
Run a WPScan scan |
GET |
/health |
Server health check |
Since the AI model can now execute commands on the terminal, the possibilities go beyond just pentesting:
theHarvester, amass, subfinder, etc.Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"hackbridge": {
"command": "npx",
"args": []
}
}
}Web content fetching and conversion for efficient LLM usage.
Retrieval from AWS Knowledge Base using Bedrock Agent Runtime.
Provides auto-configuration for setting up an MCP server in Spring Boot applications.
A very streamlined mcp client that supports calling and monitoring stdio/sse/streamableHttp, and can also view request responses through the /logs page. It also