Skip to main content

BOAZ MCP Server - AI-Powered Evasion Framework for Authorized Red Team Operations

Project description

BOAZ MCP Logo

BOAZ-MCP

AI-Powered Evasion Framework for Authorized Red Team Operations

License Python Platform

⚠️ For authorized security testing only. Obtain written permission before use.


What is BOAZ-MCP?

BOAZ-MCP wraps the BOAZ framework with MCP (Model Context Protocol), enabling AI assistants to generate evasive payloads through natural language.

Key Features:

  • 77+ process injection loaders
  • 12 encoding schemes (AES, ChaCha20, UUID, XOR, etc.)
  • LLVM obfuscation (Akira & Pluto)
  • Syscalls, API unhooking, ETW patching
  • Anti-emulation, sleep obfuscation

Important: BOAZ wraps your existing payloads (Cobalt Strike, Mimikatz, etc.) with evasion techniques. You must provide your own payloads.


Quick Start

Docker Setup (5 Minutes) - Recommended

git clone https://github.com/Yenn503/BOAZ-MCP.git
cd BOAZ-MCP
./quickstart.sh

✅ No compilation needed • Pre-built obfuscators • Works everywhere

Manual Setup (60-90 Minutes)

git clone https://github.com/Yenn503/BOAZ-MCP.git
cd BOAZ-MCP
./install/setup.sh

Compiles Akira & Pluto LLVM obfuscators locally. Requires: Linux, 8GB+ RAM, build tools.

Detailed guides: docs/DOCKER_QUICKSTART.md | docs/INSTALL.md


Supported AI Clients

Auto-configuration available for:

  • Claude Desktop
  • Claude Code CLI
  • Continue.dev (VS Code)
  • Cursor IDE
  • VS Code (Generic MCP)

Run configurator:

./install/configure_mcp.sh

Manual configuration: See Configuration Guide


Usage Examples

Talk to your AI assistant naturally:

"I have beacon.exe. Make it evasive with UUID encoding and loader 16."
"Wrap mimikatz.exe with Akira obfuscation and ETW patching."
"Show me all threadless injection loaders."

More examples: docs/USAGE.md


Documentation

Document Description
DOCKER_QUICKSTART.md Docker setup guide
INSTALL.md Detailed installation
USAGE.md Usage examples
API.md MCP tools reference
AI_AGENTS.md AI assistant guide

File Locations

After setup:

  • Input: Place payloads in payloads/
  • Output: Find generated files in output/

Repository Structure

BOAZ-MCP/
├── quickstart.sh          # One-command setup
├── docs/                  # All documentation
├── examples/              # Configuration examples
├── install/               # Installation scripts
├── docker/                # Docker setup
├── tests/                 # Test suite
├── boaz_mcp/             # MCP server
└── BOAZ_beta/            # Core BOAZ framework

Security & Legal

This tool is for authorized security testing only.

You MUST:

  • Obtain written permission before use
  • Use in isolated environments only
  • Document all testing activities
  • Comply with applicable laws

You MUST NOT:

  • Use without authorization
  • Use on production systems
  • Use for malicious purposes

Support


License

MIT License - See LICENSE for details.

Disclaimer: THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND. Users assume all responsibility for legal compliance.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_yenn503_boaz_mcp-1.0.0.tar.gz (92.3 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

iflow_mcp_yenn503_boaz_mcp-1.0.0-py3-none-any.whl (11.7 kB view details)

Uploaded Python 3

File details

Details for the file iflow_mcp_yenn503_boaz_mcp-1.0.0.tar.gz.

File metadata

  • Download URL: iflow_mcp_yenn503_boaz_mcp-1.0.0.tar.gz
  • Upload date:
  • Size: 92.3 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_yenn503_boaz_mcp-1.0.0.tar.gz
Algorithm Hash digest
SHA256 e235c9eb493c85e42319364ab0a3508556555e6c74311736e3d74be5dbed7683
MD5 2ccc16dbcc2a9b7745a5df3e7bd753c4
BLAKE2b-256 123450fba2efce2c87ac07e6283bb071f478186eabfe3b48e6ed940014998428

See more details on using hashes here.

File details

Details for the file iflow_mcp_yenn503_boaz_mcp-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_yenn503_boaz_mcp-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 11.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.0 {"installer":{"name":"uv","version":"0.10.0","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_yenn503_boaz_mcp-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 9467026344cf599e261844de2256169ad7266b569ac1288f8d3b1c75432e2d91
MD5 0574d97715351deb7b3480638b01f613
BLAKE2b-256 06243174d8134b38791c60dfd364cc0e7fa7cc80fe366ffc03d8467e4263b58a

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page