← back

Self-Baked Kali MCP - Using Claude with Security Tools

Dec 5, 2025

mcpkalisecurityclaude-code

There’s something satisfying about building your own MCP server that wraps Kali Linux tools and then using it with Claude Code to verify things.

The Setup

An MCP (Model Context Protocol) server running on a Kali container or VM that exposes security tools as callable functions. Claude Code connects to it and can run reconnaissance, vulnerability scans, or other verification tasks through natural conversation.

Why It’s Fun

Verification becomes conversational. Instead of context-switching between terminal windows and documentation, you can ask Claude to check something and get the results inline with analysis.

Learning accelerator. When you’re not sure what tool to use or how to interpret output, Claude can explain as it goes. Good for learning offensive security workflows.

Rapid iteration. Building the MCP yourself means you control exactly which tools are exposed and how. Want to add a new scanner? Just add a tool definition.

The Pattern

You → Claude Code → MCP Server → Kali Tools → Results → Claude Analysis

Claude acts as both the interface and the interpreter. It can suggest what to run, execute it through MCP, and explain what the results mean.

A Note on Responsibility

This is for authorized testing only - your own systems, CTF challenges, or environments where you have explicit permission. The same tools that verify your defenses can be misused. Build responsibly.

The Deeper Point

MCP turns specialized tooling into conversational interfaces. Security tools are just one example. The pattern works for any domain where you want AI-assisted exploration of complex toolchains.

Sometimes the best way to understand a tool is to build the bridge yourself.