local-only server
The server can only run on the client’s local machine because it depends on local resources.
Integrations
Enables repository cloning from GitHub as part of the setup process.
Provides a comprehensive interface to Metasploit Framework capabilities, enabling listing of exploits and payloads, payload generation, target exploitation, vulnerability scanning, and management of active sessions including command execution.
Vibehacker Metasploit MCP
A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.
Prerequisites
- Python 3.10+
- Metasploit Framework
- uv (Python package manager)
Setup with uv
This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.
Installing uv
If you don't have uv installed:
Setting up the project
- Clone the repository:
- Create and activate a virtual environment with uv:
- Install dependencies:
Running Metasploit RPC Server
Before running the application, start the Metasploit RPC server:
Or use the simpler command to start the RPC server in the background on the default port (55553):
Environment Variables
Set the following environment variables:
Running the Application
or to test the tools
Features
- List available Metasploit exploits
- List available payloads
- Generate payloads
- Run exploits against targets
- Scan targets
- Manage active sessions
- Send commands to sessions
License
See the LICENSE file for details.
This server cannot be installed
A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities for exploitation, payload generation, target scanning, and session management.