kroegha/kali-docker-pentesting

This project provides a comprehensive Kali Linux Docker container with 200+ pentesting tools, optimized for use with Claude Code through a custom skill. By using direct command execution instead of MCP protocol, this system achieves **70% token efficiency** compared to traditional MCP server approaches.

7 stars3 forksUpdated Nov 17, 2025
npx skills add kroegha/kali-docker-pentesting

README

Kali Linux Docker + Claude Skill

Token-Efficient Pentesting System for Claude Code

šŸŽÆ Overview

This project provides a comprehensive Kali Linux Docker container with 200+ pentesting tools, optimized for use with Claude Code through a custom skill. By using direct command execution instead of MCP protocol, this system achieves 70% token efficiency compared to traditional MCP server approaches.

šŸ—ļø Architecture

ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│                    Claude Code                          │
│                                                         │
│  ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”   │
│  │           kali-docker-pentesting skill           │   │
│  │  (Tool catalog + usage patterns)                 │   │
│  ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜   │
│                         │                               │
│                         ā–¼                               │
│  ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”   │
│  │              bash_tool                           │   │
│  │  (Direct docker exec commands)                   │   │
│  ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜   │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜
                         │
                         ā–¼
ā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”
│            Kali Linux Docker Container                  │
│                                                         │
│  • 200+ pentesting tools                                │
│  • No MCP server overhead                               │
│  • Direct command execution                             │
│  • Persistent storage via volumes                       │
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜

šŸ“¦ What's Included

Docker Container

  • Base: Kali Linux Rolling
  • Tools: 200+ pentesting tools
    • Network scanners (nmap, masscan, zmap)
    • Web app testing (nikto, sqlmap, burp suite)
    • Password cracking (john, hashcat, hydra)
    • Wireless tools (aircrack-ng, wifite, reaver)
    • Forensics (volatility, binwalk, foremost)
    • Exploitation (metasploit, SET, beef)
    • And much more!

Claude Skill

  • Complete tool catalog
  • Usage examples for every tool
  • Common pentesting workflows
  • Troubleshooting guides
  • Best practices

Supporting Files

  • Dockerfile-kali-simple - Simplified container (no MCP)
  • docker-compose-kali.yml - Easy container management
  • SKILL.md - Claude skill documentation
  • QUICK-START.md - Quick start guide

šŸš€ Quick Start

1. Build Container

# Clone or create project directory
mkdir kali-docker-pentest && cd kali-docker-pentest

# Copy files
# - Dockerfile-kali-simple (rename to Dockerfile)
# - docker-compose-kali.yml (rename to docker-compose.yml)

# Build
docker-compose build

2. Install Skill

# Copy skill to Claude skills directory
mkdir -p /mnt/skills/user/kali-docker-pentesting/
cp SKILL.md /mnt/skills/user/kali-docker-pentesting/

3. Start Container

docker-compose up -d

4. Test

docker exec kali-pentest nmap --version

šŸ’” Usage Examples

With Claude Code

Simply ask Claude naturally:

You: "Scan 192.168.1.1 with nmap"
Claude: [Executes] docker exec kali-pentest nmap -sV 192.168.1.1

You: "Test http://testsite.local for SQL injection"
Claude: [Executes] docker exec kali-pentest sqlmap -u "http://testsite.local" --batch

You: "Crack these password hashes using rockyou"
Claude: [Executes workflow with john/hashcat]

Direct Command Line

# Network scanning
docker exec kali-pentest nmap -sV 192.168.1.0/24

# Web testing
docker exec kali-pentest nikto -h http://target.com

# Password cracking
docker exec kali-pentest john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt

# Interactive shell
docker exec -it kali-pentest /bin/bash

šŸ“Š Token Efficiency

Traditional MCP Server Approach

  • Load MCP server: ~500 tokens
  • JSON-RPC protocol: ~300 tokens
  • Tool discovery: ~200 tokens
  • Response formatting: ~200 tokens
  • Total: ~1,200 tokens per interaction

This Approach (Skill + Direct Execution)

  • Read skill: ~100 tokens
  • Direct command: ~50 tokens
  • Raw output: ~200 tokens
  • Total: ~350 tokens per interaction

Result: 70% token savings! šŸŽ‰

šŸ“ Project Structure

kali-docker-pentest/
ā”œā”€ā”€ Dockerfile                  # Container definition
ā”œā”€ā”€ docker-compose.yml         # Container orchestration
ā”œā”€ā”€ SKILL.md                   # Claude skill
ā”œā”€ā”€ QUICK-START.md            # Quick start guide
ā”œā”€ā”€ README.md                 # This file
ā”œā”€ā”€ workspace/                # Working files
ā”œā”€ā”€ results/                  # Scan outputs
ā”œā”€ā”€ wordlists/               # Custom wordlists
└── tools/                   # Additional tools

āš ļø Legal Notice

IMPORTANT: This toolset is for authorized security testing only.

  • Always obtain written permission
  • Test on

...

Read full README

Publisher

kroeghakroegha

Statistics

Stars7
Forks3
Open Issues0
CreatedNov 17, 2025