MCP Server
Vibehacker Metasploit MCP
A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities for exploitation, payload generation, target scanning, and session management.
13
GitHub Stars
8/23/2025
Last Updated
No Configuration
Please check the documentation below.
README Documentation
Vibehacker Metasploit MCP
A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.
Prerequisites
- Python 3.10+
- Metasploit Framework
- uv (Python package manager)
Setup with uv
This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.
Installing uv
If you don't have uv installed:
pip install uv
Setting up the project
- Clone the repository:
git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git
cd vibehacker_metasploit_mcp
- Create and activate a virtual environment with uv:
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
- Install dependencies:
uv pip install -e .
Running Metasploit RPC Server
Before running the application, start the Metasploit RPC server:
# Full configuration with all options
msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553
Or use the simpler command to start the RPC server in the background on the default port (55553):
msfrpcd -P your_password
Environment Variables
Set the following environment variables:
export MSF_PASSWORD=kalipassword
export MSF_SERVER=127.0.0.1
export MSF_PORT=55553
Running the Application
python main.py
or to test the tools
mcp dev main.py
Features
- List available Metasploit exploits
- List available payloads
- Generate payloads
- Run exploits against targets
- Scan targets
- Manage active sessions
- Send commands to sessions
License
See the LICENSE file for details.
Quick Actions
Key Features
Model Context Protocol
Secure Communication
Real-time Updates
Open Source