MCP ExplorerExplorer

Vibehacker Metasploit Mcp

@foolsecon 9 months ago
11 Apache-2.0
FreeCommunity
AI Systems
A FastMCP interface for Metasploit, enabling AI agent interactions.

Overview

What is Vibehacker Metasploit Mcp

vibehacker_metasploit_mcp is a FastMCP-based interface designed for the Metasploit Framework, allowing AI agents to interact seamlessly with Metasploit’s capabilities.

Use cases

Use cases for vibehacker_metasploit_mcp include automating penetration testing tasks, quickly generating and deploying payloads, managing multiple sessions during security assessments, and enhancing the efficiency of security operations.

How to use

To use vibehacker_metasploit_mcp, first ensure you have Python 3.10+ and the Metasploit Framework installed. Set up the project using the uv package manager, activate a virtual environment, and install dependencies. Start the Metasploit RPC server, configure environment variables, and then run the application using ‘python main.py’.

Key features

Key features of vibehacker_metasploit_mcp include listing available Metasploit exploits and payloads, generating payloads, running exploits against targets, scanning targets, managing active sessions, and sending commands to those sessions.

Where to use

vibehacker_metasploit_mcp can be used in cybersecurity fields, particularly in penetration testing, vulnerability assessment, and security research, where automated interaction with Metasploit is beneficial.

Content

Vibehacker Metasploit MCP

A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.

Prerequisites

  • Python 3.10+
  • Metasploit Framework
  • uv (Python package manager)

Setup with uv

This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.

Installing uv

If you don’t have uv installed:

pip install uv

Setting up the project

  1. Clone the repository:
git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git
cd vibehacker_metasploit_mcp
  1. Create and activate a virtual environment with uv:
uv venv
source .venv/bin/activate  # On Windows: .venv\Scripts\activate
  1. Install dependencies:
uv pip install -e .

Running Metasploit RPC Server

Before running the application, start the Metasploit RPC server:

# Full configuration with all options
msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553

Or use the simpler command to start the RPC server in the background on the default port (55553):

msfrpcd -P your_password

Environment Variables

Set the following environment variables:

export MSF_PASSWORD=kalipassword
export MSF_SERVER=127.0.0.1
export MSF_PORT=55553

Running the Application

python main.py

or to test the tools

mcp dev main.py

Features

  • List available Metasploit exploits
  • List available payloads
  • Generate payloads
  • Run exploits against targets
  • Scan targets
  • Manage active sessions
  • Send commands to sessions

License

See the LICENSE file for details.

Tools

No tools

Comments

Recommend MCP Servers

View All MCP Servers