MetasploitMCP is a server implementation that provides AI assistants with a secure interface to Metasploit Framework's penetration testing capabilities. Developed by GH05TCREW, this Python-based server uses FastAPI and the pymetasploit3 library to expose Metasploit functionality through MCP tools including exploit execution, payload generation, session management, and post-exploitation modules. The implementation handles both synchronous and asynchronous command execution, manages console sessions carefully, and includes robust error handling and logging, making it particularly valuable for security professionals who want to leverage AI assistance for penetration testing workflows while maintaining precise control over Metasploit operations.
Aucun avis encore. Soyez le premier à donner votre avis !
Connectez-vous pour rejoindre la conversation
Search and list available Metasploit exploit modules.
Search and list available Metasploit payload modules with optional platform and architecture filtering.
Configure and execute an exploit against a target with options to run checks first.
Run any Metasploit auxiliary module with custom options.
Execute post-exploitation modules against existing sessions.
Generate payload files using Metasploit RPC (saves files locally).
Show current Metasploit sessions with detailed information.
Run a command in an active shell or Meterpreter session.
Forcefully end an active session.
Show all active handlers and background jobs.
Create a new multi/handler to receive connections.
Terminate any running job or handler.