MetasploitMCP exposes Metasploit's penetration testing tools to AI agents. It provides access to exploit modules, payloads, and auxiliary tools. The server connects to Metasploit's API, allowing agents to automate vulnerability scanning, exploit execution, and post-exploitation tasks. Developers use it to build AI-driven security testing workflows, automate red team operations, and enhance threat intelligence.
MetasploitMCP exposes Metasploit's penetration testing tools to AI agents. It provides access to exploit modules, payloads, and auxiliary tools. The server connects to Metasploit's API, allowing agents to automate vulnerability scanning, exploit execution, and post-exploitation tasks. Developers use it to build AI-driven security testing workflows, automate red team operations, and enhance threat intelligence.
pip install MetasploitMCPAdd this configuration to your claude_desktop_config.json:
{
"mcpServers": {
"gh05tcrew-metasploitmcp-github": {
"command": "uvx",
"args": [
"pip install MetasploitMCP"
]
}
}
}Restart Claude Desktop, then ask:
"What tools do you have available from MetasploitMCP?"
API Key Required
This server requires an API key from MetasploitMCP. Add it to your environment or config.
| Variable | Required | Description |
|---|---|---|
| METASPLOITMCP_API_KEY | Yes | Your MetasploitMCP API key |
"What resources are available in MetasploitMCP?"
Claude will query available resources and return a list of what you can access.
"Show me details about [specific item] in MetasploitMCP"
Claude will fetch and display detailed information about the requested item.
"Create a new [item] in MetasploitMCP with [details]"
Claude will use the appropriate tool to create the resource and confirm success.
We build custom MCP integrations for B2B companies. From simple connections to complex multi-tool setups.