chatsploit-mpc
A Model Context Protocol (MCP) server for interacting with the Metasploit Framework through Python.
Added on 3/28/2025
Metasploit MCP Server
A Model Context Protocol (MCP) server for interacting with the Metasploit Framework through Python. This server provides a standardized interface for AI models to interact with Metasploit's functionality.
Features
- Module Management
- List available modules
- Get detailed module information
- Search for modules
- Module Execution
- Execute modules with custom options
- Get and set module options
- Session Management
- List active sessions
- Get session information
- Read/write to sessions
- Execute commands in sessions
Prerequisites
- Python 3.12 or higher
- Metasploit Framework with MSFRPC enabled
- MCP client library
- uv (Python package installer)
Installation
- Clone this repository
- Install dependencies:
uv pip install -r requirements.txt
Configuration
Create a .env file with the following settings:
MSF_RPC_USERNAME=your_username
MSF_RPC_PASSWORD=your_password
MSF_RPC_HOST=127.0.0.1
MSF_RPC_PORT=55553
MSF_RPC_SSL=false
Usage
-
Start the Metasploit RPC server:
msfrpcd -P your_password -S -a 127.0.0.1 -
Run the MCP server (this is also how your MCP client can run this server):
uv --directory <path you cloned to> run python main.py --role viewer
Available Tools
Module Management
list_modules: List available Metasploit modulesmodule_info: Get detailed information about a specific modulesearch_modules: Search for modules matching a query
Module Execution
execute_module: Execute a module with specified optionsget_options: Get available options for a moduleset_option: Set an option for a module
Session Management
list_sessions: List all active sessionssession_info: Get detailed information about a sessionsession_write: Write data to a sessionsession_read: Read data from a sessionrun_command: Execute a command in a session
License
MIT License
Similar Resources
Developer Tools