You signed in with another tab or window. Reload
to refresh your session. You signed out in another tab or window. Reload
to refresh your session. You switched accounts on another tab or window. Reload
to refresh your session. Dismiss alert
xcape-inc / chatsploit-mpc Public
Metasploit MCP Server
4 stars
0 forks
Branches
Tags
Activity
Notifications
You must be signed in to change notification settings
main
Go to file
Code
| Name | | Name | Last commit message | Last commit date |
| --- | --- | --- | --- |
| Latest commit
-------------
fpr1m3
Update README with proper env stuff
Mar 21, 2025
878f6b7
· Mar 21, 2025
History
-------
3 Commits
| | |
| resources | | resources | Python version | Mar 21, 2025 |
| tools | | tools | Python version | Mar 21, 2025 |
| utils | | utils | Python version | Mar 21, 2025 |
| .gitignore | | .gitignore | Python version | Mar 21, 2025 |
| README.md | | README.md | Update README with proper env stuff | Mar 21, 2025 |
| main.py | | main.py | Python version | Mar 21, 2025 |
| mcp_server.py | | mcp_server.py | Python version | Mar 21, 2025 |
| msfrpc.py | | msfrpc.py | Python version | Mar 21, 2025 |
| pyproject.toml | | pyproject.toml | Python version | Mar 21, 2025 |
| uv.lock | | uv.lock | Python version | Mar 21, 2025 |
| View all files | | |
A Model Context Protocol (MCP) server for interacting with the Metasploit Framework through Python. This server provides a standardized interface for AI models to interact with Metasploit's functionality.
Install dependencies:
shell
uv pip install -r requirements.txt
Create a .env
file with the following settings:
MSF_RPC_USERNAME=your_username
MSF_RPC_PASSWORD=your_password
MSF_RPC_HOST=127.0.0.1
MSF_RPC_PORT=55553
MSF_RPC_SSL=false
Start the Metasploit RPC server:
shell
msfrpcd -P your_password -S -a 127.0.0.1
Run the MCP server (this is also how your MCP client can run this server):
shell
uv --directory <path you cloned to> run python main.py --role viewer
list_modules
: List available Metasploit modulesmodule_info
: Get detailed information about a specific modulesearch_modules
: Search for modules matching a queryexecute_module
: Execute a module with specified optionsget_options
: Get available options for a moduleset_option
: Set an option for a modulelist_sessions
: List all active sessionssession_info
: Get detailed information about a sessionsession_write
: Write data to a sessionsession_read
: Read data from a sessionrun_command
: Execute a command in a sessionMIT License
Metasploit MCP Server
No releases published
No packages published
You can’t perform that action at this time.