Skip to main content
Glama

MCP mítico

Una demostración rápida de MCP para Mythic, ¡que permitirá a los LLM realizar pruebas de penetración en nuestro nombre!

Requisitos

  1. ultravioleta

  2. Python3

  3. Claude Desktop (u otro cliente MCP)

Related MCP server: Pentest MCP

Uso con Claude Desktop

Para implementar este servidor MCP con Claude Desktop, deberá editar su claude_desktop_config.json para agregar lo siguiente:

{
    "mcpServers": {
        "mythic_mcp": {
            "command": "/Users/xpn/.local/bin/uv",
            "args": [
                "--directory",
                "/full/path/to/mythic_mcp/",
                "run",
                "main.py",
                "mythic_admin",
                "mythic_admin_password",
                "localhost",
                "7443"
            ]
        }
    }
}

Una vez hecho esto, inicie Claude Desktop. Hay ejemplos de instrucciones para mostrar cómo asignar tareas al LLM, pero en realidad cualquier opción funciona, como:

You are an automated pentester, tasked with emulating a specific threat actor. The threat actor is APT31. Your objective is: Add a flag to C:\win.txt on DC01. Perform any required steps to meet the objective, using only techniques documented by the threat actor.
-
security - not tested
F
license - not found
-
quality - not tested

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/xpn/mythic_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server