A favicon of Vibehacker Metasploit Interface

Vibehacker Metasploit Interface

Enable AI agents to seamlessly interact with Metasploit capabilities. List exploits, generate payloads, and manage sessions effortlessly. Enhance your security testing with automated tools and commands.

Installation

Installing for Claude Desktop

Option 1: One-Command Installation

npx mcpbar@latest install foolsec/vibehacker_metasploit_mcp -c claude

This command will automatically install and configure the Vibehacker Metasploit Interface MCP server for your selected client.

Option 2: Manual Configuration

Run the command below to open your configuration file:

npx mcpbar@latest edit -c claude

After opening your configuration file, copy and paste this configuration:

View JSON configuration
{
  "mcpServers": {
    "Vibehacker Metasploit Interface": {
      "command": "uvx",
      "args": [
        "mcp-sse"
      ],
      "env": {
        "MSF_PASS": "${input:msf_pass}",
        "MSF_PORT": "${input:msf_port}"
      }
    }
  }
}

Vibehacker Metasploit MCP

A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.

Prerequisites

  • Python 3.10+
  • Metasploit Framework
  • uv (Python package manager)

Setup with uv

This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.

Installing uv

If you don't have uv installed:

pip install uv

Setting up the project

  1. Clone the repository:
git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git
cd vibehacker_metasploit_mcp
  1. Create and activate a virtual environment with uv:
uv venv
source .venv/bin/activate  # On Windows: .venv\Scripts\activate
  1. Install dependencies:
uv pip install -e .

Running Metasploit RPC Server

Before running the application, start the Metasploit RPC server:

# Full configuration with all options
msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553

Or use the simpler command to start the RPC server in the background on the default port (55553):

msfrpcd -P your_password

Environment Variables

Set the following environment variables:

export MSF_PASSWORD=kalipassword
export MSF_SERVER=127.0.0.1
export MSF_PORT=55553

Running the Application

python main.py

or to test the tools

mcp dev main.py

Features

  • List available Metasploit exploits
  • List available payloads
  • Generate payloads
  • Run exploits against targets
  • Scan targets
  • Manage active sessions
  • Send commands to sessions

License

See the LICENSE file for details.

Share:
Details:
  • Stars


    12
  • Forks


    3
  • Last commit


    3 months ago
  • Repository age


    3 months
  • License


    Apache-2.0
View Repository

Auto-fetched from GitHub .

MCP servers similar to Vibehacker Metasploit Interface:

 

 
 
  • Stars


  • Forks


  • Last commit


 

 
 
  • Stars


  • Forks


  • Last commit


 

 
 
  • Stars


  • Forks


  • Last commit


Vibehacker Metasploit Interface: MCP Server – MCP.Bar