Skip to main content

Metasploit MCP Server for AI assistants to interact with Metasploit Framework (with improved ASGI and SSE handling)

Project description

Metasploit MCP Server

A Model Context Protocol (MCP) server for interacting with the Metasploit Framework.

Features

  • List exploits and payloads
  • Generate payloads
  • Run exploits, post modules, and auxiliary modules
  • Manage sessions and listeners
  • Send commands to active sessions

Installation

pip install gc-metasploit

Or install with uvx:

uvx gc-metasploit

Usage

Ensure Metasploit RPC is running:

msfrpcd -P your_password -S -a 127.0.0.1

Then start the MCP server:

# As a command-line tool (HTTP/SSE mode by default):
gc-metasploit

# Or as a module:
python -m gc_metasploit.server

# Specify transport mode and options:
gc-metasploit --transport http --host 0.0.0.0 --port 8085
gc-metasploit --transport stdio

Transport Options

The server supports two transport methods:

  • HTTP/SSE (Server-Sent Events): Default mode for interoperability with most MCP clients
  • STDIO (Standard Input/Output): Used with Claude Desktop and similar direct pipe connections

For Claude Desktop integration, configure claude_desktop_config.json:

{
    "mcpServers": {
        "metasploit": {
            "command": "gc-metasploit",
            "args": [
                "--transport",
                "stdio"
            ],
            "env": {
                "MSF_PASSWORD": "yourpassword"
            }
        }
    }
}

For other MCP clients that use HTTP/SSE:

  1. Start the server in HTTP mode (default):

    gc-metasploit --transport http --host 0.0.0.0 --port 8085
    
  2. Configure your MCP client to connect to:

    • SSE endpoint: http://your-server-ip:8085/sse

Environment Variables

  • MSF_PASSWORD: Metasploit RPC password (default: 'yourpassword')
  • MSF_SERVER: Metasploit RPC server (default: '127.0.0.1')
  • MSF_PORT: Metasploit RPC port (default: '55553')
  • MSF_SSL: Use SSL (default: 'false')
  • PAYLOAD_SAVE_DIR: Directory to save generated payloads (default: '~/payloads')

License

Apache 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

gc_metasploit-1.6.1.tar.gz (20.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

gc_metasploit-1.6.1-py3-none-any.whl (21.9 kB view details)

Uploaded Python 3

File details

Details for the file gc_metasploit-1.6.1.tar.gz.

File metadata

  • Download URL: gc_metasploit-1.6.1.tar.gz
  • Upload date:
  • Size: 20.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.10.11

File hashes

Hashes for gc_metasploit-1.6.1.tar.gz
Algorithm Hash digest
SHA256 a8e5ecb070332869440bb62c8273996ba923d0b6acc05342b4807e5e56e8e575
MD5 0e1efa2a9fd004f5e4f8e0bb8af31218
BLAKE2b-256 cad83ade58611bbcdc98db1e26a4bcb1dee7ef709ab69a56df3fce90190078e5

See more details on using hashes here.

File details

Details for the file gc_metasploit-1.6.1-py3-none-any.whl.

File metadata

  • Download URL: gc_metasploit-1.6.1-py3-none-any.whl
  • Upload date:
  • Size: 21.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.10.11

File hashes

Hashes for gc_metasploit-1.6.1-py3-none-any.whl
Algorithm Hash digest
SHA256 841846d6e845f9178cf6a23f33d2d02c00d9f5893c090327c7ae9a912d54d8fd
MD5 d5850b3ac1b4ae37cb1d33780a930be0
BLAKE2b-256 54d6509839fa206b80a42fdc8ab39169236502af99b7cbc24173e132d956a869

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page