60+ security tools · Docker · MCP protocol

AI-powered
offense meets analysis.

The full Kali Linux pen testing arsenal and Ghidra reverse engineering platform, containerized and orchestrated by AI through the Model Context Protocol. Your AI doesn't just think about security — it does security.

18
Pen Testing Tools
45
RE/Analysis Tools
5
Tool Categories
1
Conversation

Kali MCP — Offensive Toolkit

18 penetration testing tools containerized in Docker. Port scanning to password cracking, one conversation.

claude — kali-mcp-server
Reconnaissance & Scanning
nm
nmap
Port scanning, service detection, OS fingerprinting
nk
nikto
Web server vulnerability scanner
e4
enum4linux
SMB/NetBIOS enumeration
ss
searchsploit
Exploit-DB CVE and shellcode search
Web Application Testing
sq
sqlmap
Automated SQL injection scanner
gb
gobuster
Directory and file brute-forcing
db
dirb
Web content discovery
wp
wpscan
WordPress security scanner
Credential Testing
hy
hydra
Network login brute-forcer
hc
hashcat
GPU-accelerated password recovery
jn
john
Multi-format password cracker
cu
cupp
Targeted wordlist generation
ap
apg
Password generation and analysis
Wireless & Network
ac
aircrack-ng
WEP/WPA/WPA2 cracking suite
ar
aireplay-ng
Packet injection and replay
am
airmon-ng
Monitor mode management
ad
airodump-ng
Wireless packet capture
ts
tshark
CLI Wireshark — protocol analysis

Ghidra MCP — Reverse Engineering

AI-enhanced binary analysis with vulnerability detection, malware behavioral analysis, and decompilation. Up to 45 tools.

claude — ghidra-mcp-server
Core Analysis
dc
function_decompile
Decompile to C-like pseudocode
fi
function_info
Callers, callees, variables, cross-refs
fl
function_list
List and filter all functions
ss
string_search
Search strings with type filtering
xr
get_xrefs
Cross-reference tracking
bi
binary_import
Import and auto-analyze binaries
Vulnerability Detection
df
find_dangerous_functions
Scan for strcpy, sprintf, gets, system calls
sv
scan_vulnerabilities
Deep per-function vulnerability analysis
bo
buffer_overflow_candidates
Top 50 functions ranked by overflow risk
Malware Analysis
mb
detect_malware_behavior
Process injection, credential theft, anti-analysis
as
analyze_api_sequences
Detect malicious API call chains
ni
extract_network_indicators
URLs, IPs, domains from binary
Intelligent Prioritization
pf
prioritize_functions
Multi-factor scoring to find what matters
lf
filter_library_functions
Strip boilerplate, surface custom code
ob
detect_obfuscation
Flag packed/obfuscated sections
en
analyze_entropy
Per-section entropy and packing detection

Docker + MCP + AI. That's it.

No agents to install on targets. No cloud dependencies. Everything runs locally in containers you control.

01

Container Isolation

Both toolkits run in Docker. Your host stays clean. Kali tools can't escape the sandbox. Ghidra analysis is isolated from your network.

02

MCP Protocol

Every tool is a typed MCP function with validated inputs, structured outputs, and error handling. Claude sees them as native capabilities — not shell commands it's guessing at.

03

AI Orchestration

Claude chains tools across products. Nmap finds a service, searchsploit finds the CVE, Ghidra decompiles the vulnerable binary, and the AI writes your report.

Built for people who break things professionally.

PEN TEST FIRMS

3x engagement throughput

Automate recon and enumeration. Your senior testers focus on exploitation and report writing while the AI handles the 60% of engagement time spent running tools.

MALWARE ANALYSTS

Triage in minutes, not hours

Import a sample, detect injection patterns, extract network indicators, decompile suspicious functions — all in one conversation. The AI prioritizes what to look at first.

RED TEAMS

End-to-end kill chain

Discover the vulnerability with Kali, reverse engineer the target with Ghidra, develop the exploit with AI assistance. One platform, full chain.

SECURITY RESEARCHERS

Explore faster, publish sooner

Every tool invocation is logged with full parameters and output. Your methodology trail builds automatically. Focus on discovery, not documentation.

Pick your weapon. Or take them all.

Every plan includes all tools in the product — no feature gating.

Kali MCP
$149/mo
Offensive toolkit only
  • 18 pen testing tools
  • Docker container
  • 1 seat
  • Community support
  • Monthly updates
Get Started
Ghidra MCP
$149/mo
Reverse engineering only
  • 45 analysis tools
  • Vuln detection + malware
  • 1 seat
  • Community support
  • Monthly updates
Get Started
Enterprise
Custom
For organizations
  • Unlimited seats
  • All products + custom tools
  • On-prem deployment
  • Dedicated support + SLA
  • Custom playbooks
  • Training included
Contact Sales

Your AI is about to become
very dangerous.

Deploy in under 5 minutes. Docker pull, configure Claude, start breaking things.

Or email us directly at sales@siegeoffense.com