Skip to main content
Glama

Vibehacker Metasploit MCP

by foolsec
README.md1.7 kB
# Vibehacker Metasploit MCP A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities. ## Prerequisites - Python 3.10+ - Metasploit Framework - uv (Python package manager) ## Setup with uv This project uses [uv](https://github.com/astral-sh/uv) for dependency management. uv is a fast, reliable Python package installer and resolver. ### Installing uv If you don't have uv installed: ```bash pip install uv ``` ### Setting up the project 1. Clone the repository: ```bash git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git cd vibehacker_metasploit_mcp ``` 2. Create and activate a virtual environment with uv: ```bash uv venv source .venv/bin/activate # On Windows: .venv\Scripts\activate ``` 3. Install dependencies: ```bash uv pip install -e . ``` ### Running Metasploit RPC Server Before running the application, start the Metasploit RPC server: ```bash # Full configuration with all options msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553 ``` Or use the simpler command to start the RPC server in the background on the default port (55553): ```bash msfrpcd -P your_password ``` ### Environment Variables Set the following environment variables: ```bash export MSF_PASSWORD=kalipassword export MSF_SERVER=127.0.0.1 export MSF_PORT=55553 ``` ### Running the Application ```bash python main.py ``` or to test the tools ```bash mcp dev main.py ``` ## Features - List available Metasploit exploits - List available payloads - Generate payloads - Run exploits against targets - Scan targets - Manage active sessions - Send commands to sessions ## License See the [LICENSE](LICENSE) file for details.

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/foolsec/vibehacker_metasploit_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server