Skip to main content
Glama

神話的MCP

Mythic の簡単な MCP デモ。LLM が私たちに代わって侵入テストを行うことができます。

要件

  1. 紫外線

  2. パイソン3

  3. Claude Desktop(またはその他のMCPクライアント)

Related MCP server: Pentest MCP

Claude Desktopでの使用

この MCP サーバーを Claude Desktop とともに展開するには、 claude_desktop_config.jsonを編集して以下を追加する必要があります。

{
    "mcpServers": {
        "mythic_mcp": {
            "command": "/Users/xpn/.local/bin/uv",
            "args": [
                "--directory",
                "/full/path/to/mythic_mcp/",
                "run",
                "main.py",
                "mythic_admin",
                "mythic_admin_password",
                "localhost",
                "7443"
            ]
        }
    }
}

完了したら、Claude Desktopを起動します。LLMにタスクを設定する方法を示すサンプルプロンプトがありますが、実際には以下の例のように何でも構いません。

You are an automated pentester, tasked with emulating a specific threat actor. The threat actor is APT31. Your objective is: Add a flag to C:\win.txt on DC01. Perform any required steps to meet the objective, using only techniques documented by the threat actor.
-
security - not tested
F
license - not found
-
quality - not tested

Resources

Unclaimed servers have limited discoverability.

Looking for Admin?

If you are the server author, to access and configure the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/xpn/mythic_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server