Exposes essential tmux features to AI agents, enabling session, window, and pane management, command execution with built-in safety guardrails, and the ability to capture pane output.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Post-Exploitation tmux MCP ServerList all tmux sessions and read the output from session 'recon'"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Introduction
Post-Exploitation tmux MCP is a Model Context Protocol server that exposes essential tmux features as MCP tools — giving AI agents a fully-featured terminal multiplexer for post-exploitation operations. Every command is validated through built-in guardrails that block destructive system commands before they execute. Built with FastMCP, it lets any MCP-compatible client (AI agents, automation frameworks, etc.) create sessions, spawn windows, split panes, and run commands — all while preventing accidental or malicious system damage.
Features
This server exposes 14 tools across the following categories:
Session management:
Create detached sessions
List all active sessions
Kill specific sessions
Window management:
Create new windows in a session
List windows in a session
Kill specific windows
Pane management:
Split panes vertically or horizontally
List panes with running command & PID info
Kill specific panes
Command execution (all guarded):
execute_command— run a command with guardrail validationsend_keys— send keystrokes to a pane (guarded when Enter is pressed)capture_pane— read pane output with trailing blanks stripped
Utility:
validate_command_safety— pre-check a command without executingkill_server— kill the entire tmux server
Built-in guardrails that block:
File destruction —
rm -rf /,shred,wipefsDisk operations —
mkfs,dd if=,fdisk,partedFork bombs —
:(){ :|:& };:System shutdown —
shutdown,reboot,halt,init 0/6Critical process killing —
kill -9 1,killall -9Permission bombs —
chmod -R 777 /Dangerous redirects —
> /etc/passwd,> /etc/shadowNetwork destruction —
iptables -FLog tampering —
> /var/log/,history -cObfuscated execution —
curl ... | sh,base64 -d | sh
Installation
Just clone the repository and install the dependencies:
git clone https://github.com/RaghavanSV/Tmux-MCP.git
cd 'Tmux-MCP'
pip install -r requirements.txtPrerequisite: tmux must be installed on the target machine.
Usage
Run the MCP server
python server.pyTest with the interactive client
python client.pyThe client connects to server.py via stdio, lists available tools, and gives you an interactive REPL to call them.
Connect from an MCP client (e.g. AI agent)
{
"mcpServers": {
"post-exploitation-tmux": {
"command": "python3",
"args": ["path/to/Tmux-MCP/server.py"]
}
}
}Generate a session, create a window, and run a guarded command
# Using the interactive client
> create_session("pentest", "recon")
> execute_command("pentest", "recon", "0", "nmap -sV 192.168.1.1")
> capture_pane("pentest", "recon", "0")Tool Reference
Sessions
Tool | Description |
| Create a new detached session |
| List all sessions |
| Destroy a session |
Windows
Tool | Description |
| Create a new window |
| List windows |
| Kill a window |
Panes
Tool | Description |
| Split pane vertically/horizontally |
| List panes with command & PID |
| Kill a pane |
Command Execution (Guarded)
Tool | Description |
| Run a command (guardrail-checked) |
| Send keystrokes (guarded if Enter) |
| Read pane output (trailing blanks stripped) |
Utility
Tool | Description |
| Pre-check a command without executing |
| Kill the tmux server (destroys all sessions) |
Project Structure
Post-Exploitation/
├── server.py # FastMCP server — 14 tools
├── tmux_wrapper.py # Thin Python wrapper around tmux CLI
├── guardrails.py # Command validation & safety checks
├── client.py # Interactive MCP test client
├── test_guardrails.py # Guardrails unit tests
├── requirements.txt # Python dependencies
└── README.md # This fileTesting
Run guardrail tests
python test_guardrails.pyTest MCP tools interactively
python client.pyReferences
https://github.com/tmux/tmux
https://github.com/jlowin/fastmcp
https://modelcontextprotocol.io
https://github.com/tmux-python/libtmuxDisclaimer
Use this project under your own responsibility! This tool is intended for authorized penetration testing and security research only. Unauthorized use against systems you do not own or have explicit permission to test is illegal. The author is not responsible for any misuse of this project.
License
This project is under MIT license
Copyright © 2025, RaghavanSV
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.