Skip to main content
Glama

神话 MCP

Mythic 的快速 MCP 演示,允许 LLM 代表我们进行渗透测试!

要求

  1. 紫外线

  2. python3

  3. Claude 桌面(或其他 MCP 客户端)

Related MCP server: Pentest MCP

与 Claude Desktop 一起使用

要使用 Claude Desktop 部署此 MCP 服务器,您需要编辑claude_desktop_config.json以添加以下内容:

{ "mcpServers": { "mythic_mcp": { "command": "/Users/xpn/.local/bin/uv", "args": [ "--directory", "/full/path/to/mythic_mcp/", "run", "main.py", "mythic_admin", "mythic_admin_password", "localhost", "7443" ] } } }

完成后,启动 Claude Desktop。有一些示例提示可以展示如何完成 LLM 任务,但实际上任何方法都可以按照以下方式进行:

You are an automated pentester, tasked with emulating a specific threat actor. The threat actor is APT31. Your objective is: Add a flag to C:\win.txt on DC01. Perform any required steps to meet the objective, using only techniques documented by the threat actor.
-
security - not tested
F
license - not found
-
quality - not tested

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/xpn/mythic_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server