MCP ExplorerExplorer

Read Team Mcp Server

@skjortan23on a year ago
5 MIT
FreeCommunity
AI Systems
An MCP server for AI agents to facilitate red teaming exercises.

Overview

What is Read Team Mcp Server

read-team-mcp-server is an MCP (Model Context Protocol) server designed for AI agents to utilize during red teaming exercises. It provides essential resources and tools for security testing and evaluation.

Use cases

Use cases include automated security testing, vulnerability discovery, network reconnaissance, and exploitation of identified vulnerabilities using integrated tools.

How to use

To use read-team-mcp-server, AI agents connect to the server using the MCP protocol. They can access various modules such as port scanning, vulnerability scanning, and SSH tools to perform security assessments.

Key features

Key features include high-speed port scanning with masscan, vulnerability detection with Nuclei, SSH command execution, and integration with Metasploit for exploit management. Results are stored in a MongoDB database for efficient retrieval.

Where to use

read-team-mcp-server is applicable in cybersecurity fields, particularly in penetration testing, vulnerability assessments, and red teaming exercises.

Content

Red-team-mcp

An MCP (Model Context Protocol) server for AI agents to use during red teaming exercises.

Overview

This server provides resources and tools for AI agents to access during red teaming scenarios. It implements the Model Context Protocol to allow AI agents to retrieve information, access tools, and perform actions needed for security testing and evaluation.

Architecture

graph TD
    Agent[AI Agent Client] <--> |MCP Protocol| Server[FastMCP Server]

    subgraph "MCP Server Components"
        Server --> PortScanner[Port Scanner Module]
        Server --> VulnScanner[Vulnerability Scanner Module]
        Server --> SSHTools[SSH Tools Module]
        Server --> Metasploit[Metasploit Integration]
        Server --> DomainDiscovery[Domain Discovery Module]
        Server <--> Database[(MongoDB Database)]
    end

    subgraph "External Tools"
        PortScanner --> Masscan[masscan]
        VulnScanner --> Nuclei[nuclei]
        SSHTools --> SSH[SSH Client]
        Metasploit --> MSFRPC[Metasploit RPC]
        DomainDiscovery --> Subfinder[subfinder]
    end

    Database --> Findings[Findings]

Components

1. Port Scanner

  • Integrates with masscan for high-speed port scanning
  • Allows AI agents to discover open ports and services on target networks
  • Configurable scan parameters (IP ranges, port ranges, scan rate)
  • Results parsing and formatting for agent consumption

2. Vulnerability Scanner

  • Integrates with Nuclei for vulnerability detection
  • Supports custom templates and severity filtering
  • Stores results in MongoDB for fast searching

3. SSH Tools

  • SSH command execution with credential authentication
  • SSH brute force capabilities with username/password lists
  • Results stored with host and port information

4. Metasploit Integration

  • Exploit Database: Pre-populated MongoDB collection with all Metasploit exploits
  • Fast Search: Search exploits by platform, CVE, rank, author, or keywords
  • Exploit Execution: Execute exploits against targets with payload configuration
  • Live Querying: Real-time exploit listing from Metasploit RPC server

Implementation Plan

  1. Set up basic MCP server structure
  2. Implement masscan integration with parameter validation
  3. Create result parsing and storage mechanisms
  4. Add additional components (forthcoming)
  5. Implement logging and monitoring
  6. Build permission and boundary systems

Todos

  • [x] Add nuclei scanner
  • [x] Add SSH scanner
  • [x] Add Metasploit integration
  • [x] Implement fully asynchronous FastMCP server
  • [ ] Add tests
  • [ ] Prompt for step by step hacking of a machine. (See agents/simple_agent.py)

Setup

installing 3rp party tools

The setup is depending on the following tools

  • mongodb
  • nuclei

Exploit Database Setup

To enable fast exploit searching, populate the Metasploit exploits database:

  1. Prerequisites:

    • Metasploit Framework installed
    • MongoDB running on localhost:27017
    • Metasploit RPC server running: msfrpcd -P msf -a 127.0.0.1
    • Python dependencies: pip install pymetasploit3
  2. Populate Database:

    python scripts/setup_exploits_db.py
    
  3. Test Setup:

    python scripts/test_exploits_db.py
    

This creates a searchable database of all Metasploit exploits with metadata including:

  • CVE references
  • Platform information
  • Exploit rank and author
  • Compatible payloads
  • Required options

Usage

Exploit Search Examples

# Search Windows SMB exploits
search_exploits_fast(platform='windows', search_term='smb')

# Find EternalBlue exploit
search_exploits_fast(cve='CVE-2017-0144')

# Get high-quality exploits
search_exploits_fast(rank='excellent')

# Search by author
search_exploits_fast(author='hdm')

Development

Details on extending the server with new tools and resources will be added.

Tools

No tools

Comments

Recommend MCP Servers

View All MCP Servers