MSF Console

MCP server for the Metasploit Framework - Great functionality coverage.
  • python

5

GitHub Stars

python

Language

4 months ago

First Indexed

3 weeks ago

Catalog Refreshed

Documentation & install

Readme and setup notes from the catalogue, plus a client-ready config you can copy for your MCP host.

Installation

Add the following to your MCP client configuration file.

Configuration

View docs
{
  "mcpServers": {
    "lyftium-inc-msfconsole-mcp": {
      "command": "python",
      "args": [
        "/path/to/msfconsole-mcp/mcp_server_stable.py"
      ]
    }
  }
}

You can run the MSF Console MCP Server to expose 48 tailored penetration testing tools through a structured AI assistant interface. This server integrates with the Metasploit Framework Console, providing centralized access to exploitation, post-exploitation, scanning, credential handling, reporting, and evasion workflows for authorized security testing.

How to use

Power up the MCP server and connect with your MCP client. You will be able to load and execute tool modules, manage sessions, run scans, chain exploitation steps, leverage post‑exploitation modules, and generate professional reports. Use the client’s commands to load a specific tool (for example module management, scanning, or reporting) and let the MCP routing handle the underlying MSF Console interactions.

How to install

Prerequisites you need before installation: a Python runtime and network access. You should also have permission to test the target environment.

Step by step commands to set up the MCP server locally:

# 1. Clone the MCP server repository
git clone https://github.com/PreistlyPython/msfconsole-mcp.git

# 2. Move into the project directory
cd msfconsole-mcp

# 3. Install required Python dependencies
pip install -r requirements.txt

# 4. Prepare the MCP server configuration for Claude Desktop
# This creates the MCP server entry that points to the Python script
# You will adapt the path to your local environment
{
  "msfconsole-full": {
    "command": "python",
    "args": ["/path/to/msfconsole-mcp/mcp_server_stable.py"]
  }
}

Additional information

Security and testing considerations: use only on systems you own or have explicit permission to test. Separate engagements with workspaces, and review commands before executing them. Validate installation with the provided test routine and ensure you operate within applicable laws and regulations.

Available tools

msf_execute_command

Execute MSFConsole commands within the MCP context to control modules, agents, and workflows.

msf_module_manager

Manage the lifecycle of Metasploit modules, including loading, configuring, and updating modules.

msf_session_interact

Interact with active sessions for real-time command execution and data collection.

msf_exploit_chain

Coordinate multi-stage exploitation workflows across multiple modules.

msf_handler_manager

Handle and configure payload handlers for different deliverables.

msf_scanner_suite

Perform comprehensive network discovery, port/service checks, and enumeration.

msf_vulnerability_tracker

Identify and track vulnerabilities across the target environment.

msf_credential_manager

Store and test credentials securely within MCP workflows.

msf_pivot_manager

Route traffic and pivot through compromised hosts to reach additional targets.

msf_post_exploitation

Run post-exploitation modules for privilege escalation, persistence, and data gathering.

msf_loot_collector

Automatically collect and organize loot from compromised systems.

msf_session_persistence

Set up persistence mechanisms to maintain access after reboots.

msf_session_upgrader

Upgrade a reverse shell to a more stable Meterpreter-like session.

msf_evasion_suite

Apply evasion techniques to evade security controls during testing.

msf_listener_orchestrator

Coordinate multiple listeners for complex payload delivery.

msf_workspace_automator

Automate repetitive tasks across workspaces and engagements.

msf_reporting_engine

Generate professional reports detailing findings, evidence, and recommendations.

Built by
VeilStrat
AI signals for GTM teams
© 2026 VeilStrat. All rights reserved.All systems operational