foolsec/vibehacker_metasploit_mcp
Built by Metorial, the integration platform for agentic AI.
foolsec/vibehacker_metasploit_mcp
Server Summary
List exploits
Generate payloads
Manage sessions
Automate security testing commands
A FastMCP-based interface for Metasploit Framework, enabling AI agents to interact with Metasploit capabilities.
This project uses uv for dependency management. uv is a fast, reliable Python package installer and resolver.
If you don't have uv installed:
pip install uv
git clone https://github.com/foolsec/vibehacker_metasploit_mcp.git
cd vibehacker_metasploit_mcp
uv venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
uv pip install -e .
Before running the application, start the Metasploit RPC server:
# Full configuration with all options
msfrpcd -P kalipassword -S -a 127.0.0.1 -p 55553
Or use the simpler command to start the RPC server in the background on the default port (55553):
msfrpcd -P your_password
Set the following environment variables:
export MSF_PASSWORD=kalipassword
export MSF_SERVER=127.0.0.1
export MSF_PORT=55553
python main.py
or to test the tools
mcp dev main.py
See the LICENSE file for details.