MCP ExplorerExplorer

Mythic Mcp

@xpnon 9 months ago
62 MIT
FreeCommunity
AI Systems
A simple POC to expose Mythic as a MCP server

Overview

What is Mythic Mcp

mythic_mcp is a simple proof of concept (POC) that exposes Mythic as an MCP server, enabling large language models (LLMs) to perform penetration testing on behalf of users.

Use cases

Use cases include automated penetration testing, threat actor simulation, and security assessments in various environments, allowing organizations to test their defenses against specific threats.

How to use

To use mythic_mcp with Claude Desktop, edit the ‘claude_desktop_config.json’ file to include the MCP server configuration. Once configured, start Claude Desktop and use prompts to instruct the LLM on pentesting tasks.

Key features

Key features include easy integration with Claude Desktop, the ability to simulate penetration testing scenarios using LLMs, and support for various threat actor emulations.

Where to use

undefined

Content

Mythic MCP

A quick MCP demo for Mythic, allowing LLMs to pentest on our behalf!

Requirements

  1. uv
  2. python3
  3. Claude Desktop (or other MCP Client)

Usage with Claude Desktop

To deploy this MCP Server with Claude Desktop, you’ll need to edit your claude_desktop_config.json to add the following:

{
    "mcpServers": {
        "mythic_mcp": {
            "command": "/Users/xpn/.local/bin/uv",
            "args": [
                "--directory",
                "/full/path/to/mythic_mcp/",
                "run",
                "main.py",
                "mythic_admin",
                "mythic_admin_password",
                "localhost",
                "7443"
            ]
        }
    }
}

Once done, kick off Claude Desktop. There are sample prompts to show how to task the LLM, but really anything will work along the lines of:

You are an automated pentester, tasked with emulating a specific threat actor. The threat actor is APT31. Your objective is: Add a flag to C:\win.txt on DC01. Perform any required steps to meet the objective, using only techniques documented by the threat actor.

Tools

No tools

Comments

Recommend MCP Servers

View All MCP Servers