- Explore MCP Servers
- vibehacker_metasploit_mcp
Vibehacker Metasploit Mcp
What is Vibehacker Metasploit Mcp
vibehacker_metasploit_mcp is a FastMCP-based interface designed for the Metasploit Framework, allowing AI agents to interact seamlessly with Metasploit’s capabilities.
Use cases
Use cases for vibehacker_metasploit_mcp include automating penetration testing tasks, quickly generating and deploying payloads, managing multiple sessions during security assessments, and enhancing the efficiency of security operations.
How to use
To use vibehacker_metasploit_mcp, first ensure you have Python 3.10+ and the Metasploit Framework installed. Set up the project using the uv package manager, activate a virtual environment, and install dependencies. Start the Metasploit RPC server, configure environment variables, and then run the application using ‘python main.py’.
Key features
Key features of vibehacker_metasploit_mcp include listing available Metasploit exploits and payloads, generating payloads, running exploits against targets, scanning targets, managing active sessions, and sending commands to those sessions.
Where to use
vibehacker_metasploit_mcp can be used in cybersecurity fields, particularly in penetration testing, vulnerability assessment, and security research, where automated interaction with Metasploit is beneficial.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Overview
What is Vibehacker Metasploit Mcp
vibehacker_metasploit_mcp is a FastMCP-based interface designed for the Metasploit Framework, allowing AI agents to interact seamlessly with Metasploit’s capabilities.
Use cases
Use cases for vibehacker_metasploit_mcp include automating penetration testing tasks, quickly generating and deploying payloads, managing multiple sessions during security assessments, and enhancing the efficiency of security operations.
How to use
To use vibehacker_metasploit_mcp, first ensure you have Python 3.10+ and the Metasploit Framework installed. Set up the project using the uv package manager, activate a virtual environment, and install dependencies. Start the Metasploit RPC server, configure environment variables, and then run the application using ‘python main.py’.
Key features
Key features of vibehacker_metasploit_mcp include listing available Metasploit exploits and payloads, generating payloads, running exploits against targets, scanning targets, managing active sessions, and sending commands to those sessions.
Where to use
vibehacker_metasploit_mcp can be used in cybersecurity fields, particularly in penetration testing, vulnerability assessment, and security research, where automated interaction with Metasploit is beneficial.
Clients Supporting MCP
The following are the main client software that supports the Model Context Protocol. Click the link to visit the official website for more information.
Content
Vibehacker Metasploit MCP
A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.
Prerequisites
- Python 3.10+
- Metasploit Framework
- uv (Python package manager)
Setup with uv
This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.
Installing uv
If you don’t have uv installed:
pip install uv
Setting up the project
- Clone the repository:
git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git
cd vibehacker_metasploit_mcp
- Create and activate a virtual environment with uv:
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
- Install dependencies:
uv pip install -e .
Running Metasploit RPC Server
Before running the application, start the Metasploit RPC server:
# Full configuration with all options
msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553
Or use the simpler command to start the RPC server in the background on the default port (55553):
msfrpcd -P your_password
Environment Variables
Set the following environment variables:
export MSF_PASSWORD=kalipassword
export MSF_SERVER=127.0.0.1
export MSF_PORT=55553
Running the Application
python main.py
or to test the tools
mcp dev main.py
Features
- List available Metasploit exploits
- List available payloads
- Generate payloads
- Run exploits against targets
- Scan targets
- Manage active sessions
- Send commands to sessions
License
See the LICENSE file for details.
Dev Tools Supporting MCP
The following are the main code editors that support the Model Context Protocol. Click the link to visit the official website for more information.










