Skip to main content

Metasploit MCP Server for AI assistants to interact with Metasploit Framework (with improved ASGI and SSE handling)

Project description

Metasploit MCP Server

A Model Context Protocol (MCP) server for interacting with the Metasploit Framework.

Features

  • List exploits and payloads
  • Generate payloads
  • Run exploits, post modules, and auxiliary modules
  • Manage sessions and listeners
  • Send commands to active sessions

Installation

pip install gc-metasploit

Or install with uvx:

uvx gc-metasploit

Usage

Ensure Metasploit RPC is running:

msfrpcd -P your_password -S -a 127.0.0.1

Then start the MCP server:

# As a command-line tool (HTTP/SSE mode by default):
gc-metasploit

# Or as a module:
python -m gc_metasploit.server

# Specify transport mode and options:
gc-metasploit --transport http --host 0.0.0.0 --port 8085
gc-metasploit --transport stdio

Transport Options

The server supports two transport methods:

  • HTTP/SSE (Server-Sent Events): Default mode for interoperability with most MCP clients
  • STDIO (Standard Input/Output): Used with Claude Desktop and similar direct pipe connections

For Claude Desktop integration, configure claude_desktop_config.json:

{
    "mcpServers": {
        "metasploit": {
            "command": "gc-metasploit",
            "args": [
                "--transport",
                "stdio"
            ],
            "env": {
                "MSF_PASSWORD": "yourpassword"
            }
        }
    }
}

For other MCP clients that use HTTP/SSE:

  1. Start the server in HTTP mode (default):

    gc-metasploit --transport http --host 0.0.0.0 --port 8085
    
  2. Configure your MCP client to connect to:

    • SSE endpoint: http://your-server-ip:8085/sse

Environment Variables

  • MSF_PASSWORD: Metasploit RPC password (default: 'yourpassword')
  • MSF_SERVER: Metasploit RPC server (default: '127.0.0.1')
  • MSF_PORT: Metasploit RPC port (default: '55553')
  • MSF_SSL: Use SSL (default: 'false')
  • PAYLOAD_SAVE_DIR: Directory to save generated payloads (default: '~/payloads')

License

Apache 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

gc_metasploit-1.6.2.tar.gz (21.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

gc_metasploit-1.6.2-py3-none-any.whl (22.1 kB view details)

Uploaded Python 3

File details

Details for the file gc_metasploit-1.6.2.tar.gz.

File metadata

  • Download URL: gc_metasploit-1.6.2.tar.gz
  • Upload date:
  • Size: 21.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.10.11

File hashes

Hashes for gc_metasploit-1.6.2.tar.gz
Algorithm Hash digest
SHA256 b06cd02afe5952154c7dece3a6b9defb27728d38128c070292fb0e752436f0d3
MD5 6f476673b710bbb998737d30e8c62105
BLAKE2b-256 d113740d008514c7098c2176c7df028faff4285dd132919472bc7c3f4810b6ce

See more details on using hashes here.

File details

Details for the file gc_metasploit-1.6.2-py3-none-any.whl.

File metadata

  • Download URL: gc_metasploit-1.6.2-py3-none-any.whl
  • Upload date:
  • Size: 22.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.10.11

File hashes

Hashes for gc_metasploit-1.6.2-py3-none-any.whl
Algorithm Hash digest
SHA256 ab244480ff7cf26a3197ee0ccb732cf5bdc4fc0ce6057fb62dc90b54aa86750f
MD5 3e1377c5d4a5c174f72b52862d2a74bc
BLAKE2b-256 21f6022c2048558ec9d7af74fdf9042b372278ee53f56b025ffb42b6ddd4f592

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page