The Mythic MCP Server is a proof-of-concept (POC) implementation designed to expose Mythic as a Message Control Protocol (MCP) server. This project enables Large Language Models (LLMs) to automate penetration testing tasks, providing a seamless integration with tools like Claude Desktop.
To use the Mythic MCP Server, ensure the following dependencies are installed:
1. uv
2. python3
3. Claude Desktop (or another MCP client)
To deploy the Mythic MCP Server with Claude Desktop, modify the claude_desktop_config.json
file to include the following configuration:
{
"mcpServers": {
"mythic_mcp": {
"command": "/Users/xpn/.local/bin/uv",
"args": [
"--directory",
"/full/path/to/mythic_mcp/",
"run",
"main.py",
"mythic_admin",
"mythic_admin_password",
"localhost",
"7443"
]
}
}
}
Once configured, launch Claude Desktop to begin using the MCP server.
The Mythic MCP Server allows you to task an LLM with automated penetration testing. Here’s an example prompt to guide the LLM:
You are an automated pentester, tasked with emulating a specific threat actor. The threat actor is APT31. Your objective is: Add a flag to C:\win.txt on DC01. Perform any required steps to meet the objective, using only techniques documented by the threat actor.
This project serves as a simple POC to demonstrate how Mythic can be exposed as an MCP server, enabling LLMs to perform automated pentesting tasks.