- Explore MCP Servers
- read-team-mcp-server
Read Team Mcp Server
What is Read Team Mcp Server
read-team-mcp-server is an MCP (Model Context Protocol) server designed for AI agents to utilize during red teaming exercises. It provides essential resources and tools for security testing and evaluation.
Use cases
Use cases include automated security testing, vulnerability discovery, network reconnaissance, and exploitation of identified vulnerabilities using integrated tools.
How to use
To use read-team-mcp-server, AI agents connect to the server using the MCP protocol. They can access various modules such as port scanning, vulnerability scanning, and SSH tools to perform security assessments.
Key features
Key features include high-speed port scanning with masscan, vulnerability detection with Nuclei, SSH command execution, and integration with Metasploit for exploit management. Results are stored in a MongoDB database for efficient retrieval.
Where to use
read-team-mcp-server is applicable in cybersecurity fields, particularly in penetration testing, vulnerability assessments, and red teaming exercises.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Overview
What is Read Team Mcp Server
read-team-mcp-server is an MCP (Model Context Protocol) server designed for AI agents to utilize during red teaming exercises. It provides essential resources and tools for security testing and evaluation.
Use cases
Use cases include automated security testing, vulnerability discovery, network reconnaissance, and exploitation of identified vulnerabilities using integrated tools.
How to use
To use read-team-mcp-server, AI agents connect to the server using the MCP protocol. They can access various modules such as port scanning, vulnerability scanning, and SSH tools to perform security assessments.
Key features
Key features include high-speed port scanning with masscan, vulnerability detection with Nuclei, SSH command execution, and integration with Metasploit for exploit management. Results are stored in a MongoDB database for efficient retrieval.
Where to use
read-team-mcp-server is applicable in cybersecurity fields, particularly in penetration testing, vulnerability assessments, and red teaming exercises.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Content
Red-team-mcp
An MCP (Model Context Protocol) server for AI agents to use during red teaming exercises.
Overview
This server provides resources and tools for AI agents to access during red teaming scenarios. It implements the Model Context Protocol to allow AI agents to retrieve information, access tools, and perform actions needed for security testing and evaluation.
Architecture
graph TD Agent[AI Agent Client] <--> |MCP Protocol| Server[FastMCP Server] subgraph "MCP Server Components" Server --> PortScanner[Port Scanner Module] Server --> VulnScanner[Vulnerability Scanner Module] Server --> SSHTools[SSH Tools Module] Server --> Metasploit[Metasploit Integration] Server --> DomainDiscovery[Domain Discovery Module] Server <--> Database[(MongoDB Database)] end subgraph "External Tools" PortScanner --> Masscan[masscan] VulnScanner --> Nuclei[nuclei] SSHTools --> SSH[SSH Client] Metasploit --> MSFRPC[Metasploit RPC] DomainDiscovery --> Subfinder[subfinder] end Database --> Findings[Findings]
Components
1. Port Scanner
- Integrates with masscan for high-speed port scanning
- Allows AI agents to discover open ports and services on target networks
- Configurable scan parameters (IP ranges, port ranges, scan rate)
- Results parsing and formatting for agent consumption
2. Vulnerability Scanner
- Integrates with Nuclei for vulnerability detection
- Supports custom templates and severity filtering
- Stores results in MongoDB for fast searching
3. SSH Tools
- SSH command execution with credential authentication
- SSH brute force capabilities with username/password lists
- Results stored with host and port information
4. Metasploit Integration
- Exploit Database: Pre-populated MongoDB collection with all Metasploit exploits
- Fast Search: Search exploits by platform, CVE, rank, author, or keywords
- Exploit Execution: Execute exploits against targets with payload configuration
- Live Querying: Real-time exploit listing from Metasploit RPC server
Implementation Plan
- Set up basic MCP server structure
- Implement masscan integration with parameter validation
- Create result parsing and storage mechanisms
- Add additional components (forthcoming)
- Implement logging and monitoring
- Build permission and boundary systems
Todos
- [x] Add nuclei scanner
- [x] Add SSH scanner
- [x] Add Metasploit integration
- [x] Implement fully asynchronous FastMCP server
- [ ] Add tests
- [ ] Prompt for step by step hacking of a machine. (See agents/simple_agent.py)
Setup
installing 3rp party tools
The setup is depending on the following tools
- mongodb
- nuclei
Exploit Database Setup
To enable fast exploit searching, populate the Metasploit exploits database:
-
Prerequisites:
- Metasploit Framework installed
- MongoDB running on localhost:27017
- Metasploit RPC server running:
msfrpcd -P msf -a 127.0.0.1 - Python dependencies:
pip install pymetasploit3
-
Populate Database:
python scripts/setup_exploits_db.py -
Test Setup:
python scripts/test_exploits_db.py
This creates a searchable database of all Metasploit exploits with metadata including:
- CVE references
- Platform information
- Exploit rank and author
- Compatible payloads
- Required options
Usage
Exploit Search Examples
# Search Windows SMB exploits
search_exploits_fast(platform='windows', search_term='smb')
# Find EternalBlue exploit
search_exploits_fast(cve='CVE-2017-0144')
# Get high-quality exploits
search_exploits_fast(rank='excellent')
# Search by author
search_exploits_fast(author='hdm')
Development
Details on extending the server with new tools and resources will be added.
Dev Tools Supporting MCP
The following are the main code editors that support the Model Context Protocol. Click the link to visit the official website for more information.










