Skip to main content
Glama

神话 MCP

Mythic 的快速 MCP 演示,允许 LLM 代表我们进行渗透测试!

要求

  1. 紫外线

  2. python3

  3. Claude 桌面(或其他 MCP 客户端)

Related MCP server: Pentest MCP

与 Claude Desktop 一起使用

要使用 Claude Desktop 部署此 MCP 服务器,您需要编辑claude_desktop_config.json以添加以下内容:

{
    "mcpServers": {
        "mythic_mcp": {
            "command": "/Users/xpn/.local/bin/uv",
            "args": [
                "--directory",
                "/full/path/to/mythic_mcp/",
                "run",
                "main.py",
                "mythic_admin",
                "mythic_admin_password",
                "localhost",
                "7443"
            ]
        }
    }
}

完成后,启动 Claude Desktop。有一些示例提示可以展示如何完成 LLM 任务,但实际上任何方法都可以按照以下方式进行:

You are an automated pentester, tasked with emulating a specific threat actor. The threat actor is APT31. Your objective is: Add a flag to C:\win.txt on DC01. Perform any required steps to meet the objective, using only techniques documented by the threat actor.
F
license - not found
-
quality - not tested
C
maintenance

Resources

Unclaimed servers have limited discoverability.

Looking for Admin?

If you are the server author, to access and configure the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/xpn/mythic_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server