The reputation layer for AI skills, tools & agents

GH05TCREW/MetasploitMCP

Score: 41.0 Rank #1912

MCP Server for Metasploit

Overview

GH05TCREW/MetasploitMCP is a Python MCP server licensed under Apache-2.0. MCP Server for Metasploit

Ranked #1912 out of 25632 indexed tools.

In the top 8% of all indexed tools.

Ecosystem

Python Apache-2.0

Signal Breakdown

Stars 521
Freshness 1mo ago
Issue Health 56%
Contributors 4
Dependents 0
Forks 156
Description Brief
License Apache-2.0

How to Improve

Description low impact

Expand your description to 150+ characters for better discoverability

Freshness high impact

Last commit was 38 days ago — a recent commit would boost your freshness score

Dependents medium impact

No downstream dependents detected yet — adoption by other projects is the strongest trust signal

Badge

AgentRank score for GH05TCREW/MetasploitMCP
[![AgentRank](https://agentrank-ai.com/api/badge/tool/GH05TCREW--MetasploitMCP)](https://agentrank-ai.com/tool/GH05TCREW--MetasploitMCP)
<a href="https://agentrank-ai.com/tool/GH05TCREW--MetasploitMCP"><img src="https://agentrank-ai.com/api/badge/tool/GH05TCREW--MetasploitMCP" alt="AgentRank"></a>

Matched Queries

"mcp server""mcp-server"

From the README

# Metasploit MCP Server

A Model Context Protocol (MCP) server for Metasploit Framework integration.

https://github.com/user-attachments/assets/39b19fb5-8397-4ccd-b896-d1797ec185e1

## Description

This MCP server provides a bridge between large language models like Claude and the Metasploit Framework penetration testing platform. It allows AI assistants to dynamically access and control Metasploit functionality through standardized tools, enabling a natural language interface to complex security testing workflows.

## Features

### Module Information

- **list_exploits**: Search and list available Metasploit exploit modules
- **list_payloads**: Search and list available Metasploit payload modules with optional platform and architecture filtering

### Exploitation Workflow

- **run_exploit**: Configure and execute an exploit against a target with options to run checks first
- **run_auxiliary_module**: Run any Metasploit auxiliary module with custom options
- **run_post_module**: Execu
Read full README on GitHub →
Are you the maintainer? Claim this listing