Skip to main content

Metasploit MCP Server for AI assistants to interact with Metasploit Framework (with improved ASGI and SSE handling)

Project description

Metasploit MCP Server

A Model Context Protocol (MCP) server for interacting with the Metasploit Framework.

Features

  • List exploits and payloads
  • Generate payloads
  • Run exploits, post modules, and auxiliary modules
  • Manage sessions and listeners
  • Send commands to active sessions

Installation

pip install gc-metasploit

Or install with uvx:

uvx gc-metasploit

Usage

Ensure Metasploit RPC is running:

msfrpcd -P your_password -S -a 127.0.0.1

Then start the MCP server:

# As a command-line tool (HTTP/SSE mode by default):
gc-metasploit

# Or as a module:
python -m gc_metasploit.server

# Specify transport mode and options:
gc-metasploit --transport http --host 0.0.0.0 --port 8085
gc-metasploit --transport stdio

Transport Options

The server supports two transport methods:

  • HTTP/SSE (Server-Sent Events): Default mode for interoperability with most MCP clients
  • STDIO (Standard Input/Output): Used with Claude Desktop and similar direct pipe connections

For Claude Desktop integration, configure claude_desktop_config.json:

{
    "mcpServers": {
        "metasploit": {
            "command": "gc-metasploit",
            "args": [
                "--transport",
                "stdio"
            ],
            "env": {
                "MSF_PASSWORD": "yourpassword"
            }
        }
    }
}

For other MCP clients that use HTTP/SSE:

  1. Start the server in HTTP mode (default):

    gc-metasploit --transport http --host 0.0.0.0 --port 8085
    
  2. Configure your MCP client to connect to:

    • SSE endpoint: http://your-server-ip:8085/sse

Environment Variables

  • MSF_PASSWORD: Metasploit RPC password (default: 'yourpassword')
  • MSF_SERVER: Metasploit RPC server (default: '127.0.0.1')
  • MSF_PORT: Metasploit RPC port (default: '55553')
  • MSF_SSL: Use SSL (default: 'false')
  • PAYLOAD_SAVE_DIR: Directory to save generated payloads (default: '~/payloads')

License

Apache 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

gc_metasploit-1.6.0.tar.gz (20.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

gc_metasploit-1.6.0-py3-none-any.whl (21.7 kB view details)

Uploaded Python 3

File details

Details for the file gc_metasploit-1.6.0.tar.gz.

File metadata

  • Download URL: gc_metasploit-1.6.0.tar.gz
  • Upload date:
  • Size: 20.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.10.11

File hashes

Hashes for gc_metasploit-1.6.0.tar.gz
Algorithm Hash digest
SHA256 0c8937a142dc60cfe1bad8bf3b15700b286504637ed6663fab5235c534502a3b
MD5 90578e9ec692151052d14d9b502007ef
BLAKE2b-256 51590176a19d5fb581b62a4a0fcecb8cb5561dfd8a7bfca4d022088b9644cb14

See more details on using hashes here.

File details

Details for the file gc_metasploit-1.6.0-py3-none-any.whl.

File metadata

  • Download URL: gc_metasploit-1.6.0-py3-none-any.whl
  • Upload date:
  • Size: 21.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.10.11

File hashes

Hashes for gc_metasploit-1.6.0-py3-none-any.whl
Algorithm Hash digest
SHA256 70715a1391de1116f79849b3220c614896210543a3bdae608faa733da86dbaf2
MD5 e038f2de486949792ee4cdedddbebe34
BLAKE2b-256 565d5ead29ae0cf778439c8480f4314ecf6cc85976e2c11b01599d6e8c4f62c7

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page