metasploit-mcp-server
If you are the rightful owner of metasploit-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
This Model Context Protocol (MCP) server allows AI assistants to execute Metasploit Framework commands through a standardized interface.
The Metasploit MCP Server is designed to facilitate interaction between AI assistants and the Metasploit Framework by providing a standardized interface for executing commands. This server wraps Metasploit's powerful capabilities into MCP tools, making them accessible to compatible clients like Claude. By leveraging the MCP protocol, users can perform a variety of tasks such as executing raw Metasploit commands, searching for exploits, retrieving module information, and conducting network and vulnerability scans. The server is built with Node.js and requires the Metasploit Framework to be installed and accessible from the command line. It uses STDIO transport for communication, ensuring compatibility with MCP clients that support this method.
Features
- Execute raw Metasploit commands directly through the MCP interface
- Search for exploits by name, CVE, or other criteria
- Get detailed module information for any Metasploit module
- List available modules by type (exploits, auxiliaries, payloads, etc.)
- Run network and vulnerability scans using Metasploit
Tools
execute-command
Execute a raw Metasploit command
search-exploit
Search for exploits by name or CVE
module-info
Get information about a specific module
list-modules
List modules by type
get-version
Get Metasploit version information
run-nmap-scan
Run a network scan using Nmap
run-vuln-scan
Run a vulnerability scan on a target