
Vibehacker Metasploit Interface
Enable AI agents to seamlessly interact with Metasploit capabilities. List exploits, generate payloads, and manage sessions effortlessly. Enhance your security testing with automated tools and commands.
Vibehacker Metasploit MCP
A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.
Prerequisites
- Python 3.10+
- Metasploit Framework
- uv (Python package manager)
Setup with uv
This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.
Installing uv
If you don't have uv installed:
pip install uv
Setting up the project
- Clone the repository:
git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git
cd vibehacker_metasploit_mcp
- Create and activate a virtual environment with uv:
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
- Install dependencies:
uv pip install -e .
Running Metasploit RPC Server
Before running the application, start the Metasploit RPC server:
# Full configuration with all options
msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553
Or use the simpler command to start the RPC server in the background on the default port (55553):
msfrpcd -P your_password
Environment Variables
Set the following environment variables:
export MSF_PASSWORD=kalipassword
export MSF_SERVER=127.0.0.1
export MSF_PORT=55553
Running the Application
python main.py
or to test the tools
mcp dev main.py
Features
- List available Metasploit exploits
- List available payloads
- Generate payloads
- Run exploits against targets
- Scan targets
- Manage active sessions
- Send commands to sessions
License
See the LICENSE file for details.
Details:
Stars
5Forks
1Last commit
1 month agoRepository age
1 monthLicense
Apache-2.0
Auto-fetched from GitHub .
MCP servers similar to Vibehacker Metasploit Interface:

Stars
Forks
Last commit

Stars
Forks
Last commit

Stars
Forks
Last commit