- Home
- MCP servers
- MSF Console
MSF Console
- python
5
GitHub Stars
python
Language
4 months ago
First Indexed
3 weeks ago
Catalog Refreshed
Documentation & install
Readme and setup notes from the catalogue, plus a client-ready config you can copy for your MCP host.
Installation
Add the following to your MCP client configuration file.
Configuration
View docs{
"mcpServers": {
"lyftium-inc-msfconsole-mcp": {
"command": "python",
"args": [
"/path/to/msfconsole-mcp/mcp_server_stable.py"
]
}
}
}You can run the MSF Console MCP Server to expose 48 tailored penetration testing tools through a structured AI assistant interface. This server integrates with the Metasploit Framework Console, providing centralized access to exploitation, post-exploitation, scanning, credential handling, reporting, and evasion workflows for authorized security testing.
How to use
Power up the MCP server and connect with your MCP client. You will be able to load and execute tool modules, manage sessions, run scans, chain exploitation steps, leverage post‑exploitation modules, and generate professional reports. Use the client’s commands to load a specific tool (for example module management, scanning, or reporting) and let the MCP routing handle the underlying MSF Console interactions.
How to install
Prerequisites you need before installation: a Python runtime and network access. You should also have permission to test the target environment.
Step by step commands to set up the MCP server locally:
# 1. Clone the MCP server repository
git clone https://github.com/PreistlyPython/msfconsole-mcp.git
# 2. Move into the project directory
cd msfconsole-mcp
# 3. Install required Python dependencies
pip install -r requirements.txt
# 4. Prepare the MCP server configuration for Claude Desktop
# This creates the MCP server entry that points to the Python script
# You will adapt the path to your local environment
{
"msfconsole-full": {
"command": "python",
"args": ["/path/to/msfconsole-mcp/mcp_server_stable.py"]
}
}
Additional information
Security and testing considerations: use only on systems you own or have explicit permission to test. Separate engagements with workspaces, and review commands before executing them. Validate installation with the provided test routine and ensure you operate within applicable laws and regulations.
Available tools
msf_execute_command
Execute MSFConsole commands within the MCP context to control modules, agents, and workflows.
msf_module_manager
Manage the lifecycle of Metasploit modules, including loading, configuring, and updating modules.
msf_session_interact
Interact with active sessions for real-time command execution and data collection.
msf_exploit_chain
Coordinate multi-stage exploitation workflows across multiple modules.
msf_handler_manager
Handle and configure payload handlers for different deliverables.
msf_scanner_suite
Perform comprehensive network discovery, port/service checks, and enumeration.
msf_vulnerability_tracker
Identify and track vulnerabilities across the target environment.
msf_credential_manager
Store and test credentials securely within MCP workflows.
msf_pivot_manager
Route traffic and pivot through compromised hosts to reach additional targets.
msf_post_exploitation
Run post-exploitation modules for privilege escalation, persistence, and data gathering.
msf_loot_collector
Automatically collect and organize loot from compromised systems.
msf_session_persistence
Set up persistence mechanisms to maintain access after reboots.
msf_session_upgrader
Upgrade a reverse shell to a more stable Meterpreter-like session.
msf_evasion_suite
Apply evasion techniques to evade security controls during testing.
msf_listener_orchestrator
Coordinate multiple listeners for complex payload delivery.
msf_workspace_automator
Automate repetitive tasks across workspaces and engagements.
msf_reporting_engine
Generate professional reports detailing findings, evidence, and recommendations.