xcape_inc_chatsploit_mpc

xcape_inc_chatsploit_mpc

by xcape-inc

Module Management

Skip to content

You signed in with another tab or window. Reload
to refresh your session. You signed out in another tab or window. Reload
to refresh your session. You switched accounts on another tab or window. Reload
to refresh your session. Dismiss alert

xcape-inc / chatsploit-mpc Public

Metasploit MCP Server

4 stars
0 forks
Branches
Tags
Activity

Star

Notifications
You must be signed in to change notification settings

xcape-inc/chatsploit-mpc

main

1 Branch
0 Tags


Go to file

Code

Folders and files

| Name | | Name | Last commit message | Last commit date |
| --- | --- | --- | --- |
| Latest commit
-------------

fpr1m3
fpr1m3

Update README with proper env stuff

Mar 21, 2025

878f6b7
 · Mar 21, 2025

History
-------

3 Commits

| | |
| resources | | resources | Python version | Mar 21, 2025 |
| tools | | tools | Python version | Mar 21, 2025 |
| utils | | utils | Python version | Mar 21, 2025 |
| .gitignore | | .gitignore | Python version | Mar 21, 2025 |
| README.md | | README.md | Update README with proper env stuff | Mar 21, 2025 |
| main.py | | main.py | Python version | Mar 21, 2025 |
| mcp_server.py | | mcp_server.py | Python version | Mar 21, 2025 |
| msfrpc.py | | msfrpc.py | Python version | Mar 21, 2025 |
| pyproject.toml | | pyproject.toml | Python version | Mar 21, 2025 |
| uv.lock | | uv.lock | Python version | Mar 21, 2025 |
| View all files | | |

Repository files navigation

Metasploit MCP Server

A Model Context Protocol (MCP) server for interacting with the Metasploit Framework through Python. This server provides a standardized interface for AI models to interact with Metasploit's functionality.

Features

  • Module Management
    • List available modules
    • Get detailed module information
    • Search for modules
  • Module Execution
    • Execute modules with custom options
    • Get and set module options
  • Session Management
    • List active sessions
    • Get session information
    • Read/write to sessions
    • Execute commands in sessions

Prerequisites

  • Python 3.12 or higher
  • Metasploit Framework with MSFRPC enabled
  • MCP client library
  • uv (Python package installer)

Installation

  1. Clone this repository
  2. Install dependencies:

    shell uv pip install -r requirements.txt

Configuration

Create a .env file with the following settings:

MSF_RPC_USERNAME=your_username
MSF_RPC_PASSWORD=your_password
MSF_RPC_HOST=127.0.0.1
MSF_RPC_PORT=55553
MSF_RPC_SSL=false

Usage

  1. Start the Metasploit RPC server:

    shell msfrpcd -P your_password -S -a 127.0.0.1

  2. Run the MCP server (this is also how your MCP client can run this server):

    shell uv --directory <path you cloned to> run python main.py --role viewer

Available Tools

Module Management

  • list_modules: List available Metasploit modules
  • module_info: Get detailed information about a specific module
  • search_modules: Search for modules matching a query

Module Execution

  • execute_module: Execute a module with specified options
  • get_options: Get available options for a module
  • set_option: Set an option for a module

Session Management

  • list_sessions: List all active sessions
  • session_info: Get detailed information about a session
  • session_write: Write data to a session
  • session_read: Read data from a session
  • run_command: Execute a command in a session

License

MIT License

About

Metasploit MCP Server

Resources

Readme

Activity

Custom properties

Stars

4 stars

Watchers

4 watching

Forks

0 forks

Report repository

Releases


No releases published

Packages 0


No packages published

Languages

You can’t perform that action at this time.

Features & Capabilities

Categories
mcp_server model_context_protocol

Implementation Details

Stats

0 Views
0 Likes
4 GitHub Stars

Repository Info

xcape-inc Organization

Similar Servers

continuedev_continue by continuedev
0
0
0