LYFTIUM-INC/msfconsole-mcp
If you are the rightful owner of msfconsole-mcp and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
The MSFConsole MCP Server is a Model Context Protocol server that integrates the Metasploit Framework with AI assistants for secure and structured access to its capabilities.
MSF Console MCP Server v5.0
Production-ready Model Context Protocol (MCP) server implementation for Metasploit Framework Console, providing 48 specialized penetration testing tools through a structured AI assistant interface.
๐ Features
Core Capabilities (48 Tools)
- Exploitation Framework - Complete exploit/payload management
- Session Management - Advanced interaction with compromised systems
- Post-Exploitation - Privilege escalation, persistence, lateral movement
- Network Analysis - Scanning, enumeration, service discovery
- Vulnerability Assessment - Automated vulnerability identification
- Credential Management - Centralized credential storage and testing
- Reporting Engine - Professional penetration testing reports
- Evasion Suite - AV bypass and obfuscation techniques
Key Components
mcp_server_stable.py
- Main MCP server with 48 toolsmsf_stable_integration.py
- MSF console integration layermsf_plugin_system.py
- Plugin architecturemsf_advanced_session_manager.py
- Session handlingmsf_enhanced_tools.py
- Enhanced tool implementationsmsf_extended_tools.py
- Extended functionality
๐ฆ Installation
- Clone the repository:
# Personal Repository
git clone https://github.com/PreistlyPython/msfconsole-mcp.git
# Organization Repository
git clone https://github.com/LYFTIUM-INC/msfconsole-mcp.git
cd msfconsole-mcp
- Install dependencies:
pip install -r requirements.txt
- Configure Claude Desktop:
Add to ~/.config/claude-code/mcp_servers.json
:
{
"msfconsole-full": {
"command": "python",
"args": ["/path/to/msfconsole-mcp/mcp_server_stable.py"]
}
}
- Restart Claude Desktop to load the MCP server
๐ ๏ธ Usage
Available Tools (48 Total)
Primary Operations
msf_execute_command
- Execute MSFConsole commandsmsf_module_manager
- Complete module lifecycle managementmsf_session_interact
- Advanced session interactionmsf_exploit_chain
- Multi-stage exploitation workflowsmsf_handler_manager
- Payload handler management
Scanning & Discovery
msf_scanner_suite
- Comprehensive scanning operationsmsf_vulnerability_tracker
- Vulnerability trackingmsf_credential_manager
- Credential managementmsf_pivot_manager
- Network pivoting and routing
Post-Exploitation
msf_post_exploitation
- Post-exploitation modulesmsf_loot_collector
- Automated loot collectionmsf_session_persistence
- Persistence mechanismsmsf_session_upgrader
- Shell to Meterpreter upgrade
Advanced Features
msf_evasion_suite
- AV bypass techniquesmsf_listener_orchestrator
- Advanced listener managementmsf_workspace_automator
- Workspace automationmsf_reporting_engine
- Report generation
Example Usage in Claude
User: "Scan the network 192.168.1.0/24"
Claude: [Uses msf_module_manager to load and run network discovery]
User: "Exploit the vulnerable service on port 8080"
Claude: [Uses msf_exploit_chain for automated exploitation]
User: "Generate a report of findings"
Claude: [Uses msf_reporting_engine for professional documentation]
๐ Security Notice
IMPORTANT: This tool is for authorized security testing only.
- Only use on systems you own or have explicit permission to test
- Ensure proper network isolation during testing
- Use workspaces to separate engagements
- Review all commands before execution
- Comply with all applicable laws and regulations
๐งช Testing
Validate the installation:
python test_mcp_server.py
๐ Performance
- Tools Available: 48
- Average Response Time: 15.7 seconds
- Success Rate: 87% in production testing
- Tested Against: Real network infrastructure
๐ค Contributing
This is a specialized security tool. Contributions should focus on:
- Bug fixes and stability improvements
- Additional MSF module support
- Enhanced error handling
- Documentation improvements
๐ License
For authorized security testing and educational purposes only. Users are responsible for compliance with all applicable laws and regulations.
โ ๏ธ Disclaimer
This tool can perform actions that may be illegal if used without authorization. Never use this tool on systems you do not own or without explicit written permission. The authors assume no liability for misuse.
Version: 5.0
Status: Production Ready
Tools: 48 Specialized MSF Console Tools
Framework: Metasploit Framework Integration via MCP