Skip to main content
Glama

Vibehacker Metasploit MCP

A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.

Prerequisites

  • Python 3.10+

  • Metasploit Framework

  • uv (Python package manager)

Related MCP server: MCP-Hyperskill

Setup with uv

This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.

Installing uv

If you don't have uv installed:

pip install uv

Setting up the project

  1. Clone the repository:

git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git cd vibehacker_metasploit_mcp
  1. Create and activate a virtual environment with uv:

uv venv source .venv/bin/activate # On Windows: .venv\Scripts\activate
  1. Install dependencies:

uv pip install -e .

Running Metasploit RPC Server

Before running the application, start the Metasploit RPC server:

# Full configuration with all options msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553

Or use the simpler command to start the RPC server in the background on the default port (55553):

msfrpcd -P your_password

Environment Variables

Set the following environment variables:

export MSF_PASSWORD=kalipassword export MSF_SERVER=127.0.0.1 export MSF_PORT=55553

Running the Application

python main.py

or to test the tools

mcp dev main.py

Features

  • List available Metasploit exploits

  • List available payloads

  • Generate payloads

  • Run exploits against targets

  • Scan targets

  • Manage active sessions

  • Send commands to sessions

License

See the LICENSE file for details.

-
security - not tested
A
license - permissive license
-
quality - not tested

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/foolsec/vibehacker_metasploit_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server