Enables repository cloning from GitHub as part of the setup process.
Provides a comprehensive interface to Metasploit Framework capabilities, enabling listing of exploits and payloads, payload generation, target exploitation, vulnerability scanning, and management of active sessions including command execution.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Vibehacker Metasploit MCPscan 192.168.1.0/24 for open ports"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Vibehacker Metasploit MCP
A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.
Prerequisites
Python 3.10+
Metasploit Framework
uv (Python package manager)
Related MCP server: MCP-Hyperskill
Setup with uv
This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.
Installing uv
If you don't have uv installed:
pip install uvSetting up the project
Clone the repository:
git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git
cd vibehacker_metasploit_mcpCreate and activate a virtual environment with uv:
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activateInstall dependencies:
uv pip install -e .Running Metasploit RPC Server
Before running the application, start the Metasploit RPC server:
# Full configuration with all options
msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553Or use the simpler command to start the RPC server in the background on the default port (55553):
msfrpcd -P your_passwordEnvironment Variables
Set the following environment variables:
export MSF_PASSWORD=kalipassword
export MSF_SERVER=127.0.0.1
export MSF_PORT=55553Running the Application
python main.pyor to test the tools
mcp dev main.pyFeatures
List available Metasploit exploits
List available payloads
Generate payloads
Run exploits against targets
Scan targets
Manage active sessions
Send commands to sessions
License
See the LICENSE file for details.