Skip to main content
Glama

Vibehacker Metasploit MCP

by foolsec

Vibehacker Metasploit MCP

A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.

Prerequisites

  • Python 3.10+
  • Metasploit Framework
  • uv (Python package manager)

Setup with uv

This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.

Installing uv

If you don't have uv installed:

pip install uv

Setting up the project

  1. Clone the repository:
git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git cd vibehacker_metasploit_mcp
  1. Create and activate a virtual environment with uv:
uv venv source .venv/bin/activate # On Windows: .venv\Scripts\activate
  1. Install dependencies:
uv pip install -e .

Running Metasploit RPC Server

Before running the application, start the Metasploit RPC server:

# Full configuration with all options msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553

Or use the simpler command to start the RPC server in the background on the default port (55553):

msfrpcd -P your_password

Environment Variables

Set the following environment variables:

export MSF_PASSWORD=kalipassword export MSF_SERVER=127.0.0.1 export MSF_PORT=55553

Running the Application

python main.py

or to test the tools

mcp dev main.py

Features

  • List available Metasploit exploits
  • List available payloads
  • Generate payloads
  • Run exploits against targets
  • Scan targets
  • Manage active sessions
  • Send commands to sessions

License

See the LICENSE file for details.

-
security - not tested
A
license - permissive license
-
quality - not tested

local-only server

The server can only run on the client's local machine because it depends on local resources.

A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities for exploitation, payload generation, target scanning, and session management.

  1. Prerequisites
    1. Setup with uv
      1. Installing uv
      2. Setting up the project
      3. Running Metasploit RPC Server
      4. Environment Variables
      5. Running the Application
    2. Features
      1. License

        Related MCP Servers

        • A
          security
          F
          license
          A
          quality
          A FastMCP server implementation that facilitates resource-based access to AI model inference, focusing on image generation through the Replicate API, with features like real-time updates, webhook integration, and secure API key management.
          Last updated -
          18
          15
          Python
          • Apple
        • -
          security
          A
          license
          -
          quality
          A FastMCP server implementation that provides a standardized interface for accessing AI models hosted on Replicate's API, currently supporting image generation with customizable parameters.
          Last updated -
          3
          Python
          MIT License
        • -
          security
          F
          license
          -
          quality
          A FastMCP integration with Hyperskill that allows AI agents to explain programming topics and search for programming resources using Hyperskill's learning materials.
          Last updated -
          1
          Python
        • -
          security
          A
          license
          -
          quality
          Provides a bridge between large language models and the Metasploit Framework, enabling AI assistants to access and control penetration testing functionality through natural language.
          Last updated -
          69
          Python
          Apache 2.0
          • Linux
          • Apple

        View all related MCP servers

        MCP directory API

        We provide all the information about MCP servers via our MCP API.

        curl -X GET 'https://glama.ai/api/mcp/v1/servers/foolsec/vibehacker_metasploit_mcp'

        If you have feedback or need assistance with the MCP directory API, please join our Discord server