Full Red Team MCP Server — External Recon through Active Directory Forest Compromise. Claude Code drives the entire attack chain via stdio.
BUGTROTTER is not a wrapper. Claude Code connects directly to the Kali container over stdio (JSON-RPC 2.0). Every command runs inside the container as if you typed it yourself — driven by Claude.
JSON-RPC over stdiodocker exec -i kali-rt| COMPONENT | LOCATION | PURPOSE |
|---|---|---|
| mcp_server.py | /opt/kali_ad_mcp/ | MCP stdio server — receives JSON-RPC calls from Claude Code |
| GUIDE.md | /opt/ad_agent/kb/ | Full container map — every path, phase, tool and exact command |
| attack_index.md | /opt/ad_agent/kb/ | Attack lookup by port / CVE / phase — Claude searches before acting |
| notes.jsonl | /opt/loot/ (volume) | Persistent findings — creds, hashes, phase state across restarts |
| Neo4j | bolt://localhost:7687 | BloodHound graph backend — Cypher path queries via bloodhound_query |
| .mcp.json | repo root | Claude Code config — auto-connects on `claude` with no extra setup |
From a cold start with only a target subnet to full Enterprise Admin access — every phase automated through Claude MCP.
Claude autonomously chains these MCP tools. A single message triggers a full sequence — no manual step-by-step.
Every tool ships pre-installed and pre-patched in the Docker image. No dependency hell, no conflicting Python versions.
Prerequisites: Docker Desktop · Node.js 18+ · Claude Code