{"id":"923eba83-ee17-4a53-b25a-27b05367f1da","shortId":"wQgZT4","kind":"mcp","title":"Pymetasploit3","tagline":"Exposes Metasploit Framework capabilities via pymetasploit3 for exploit management and penetration testing.","description":"Exposes Metasploit Framework capabilities via pymetasploit3 for exploit management and penetration testing.\n\nThis server bridges the Metasploit Framework with language models through the pymetasploit3 library and msfrpc protocol. It provides tools for managing exploits, payloads, and sessions, as well as executing console commands and querying the Metasploit database. Security professionals can use it to automate penetration testing workflows that require Metasploit's capabilities.","tags":["pymetasploit3"],"capabilities":["mcp","transport-stdio","open-source"],"categories":[],"synonyms":[],"warnings":[],"endpointUrl":"https://github.com/daedalus/mcp-pymetasploit3","protocol":"mcp","transport":"stdio","auth":{"type":"mcp","details":{"transport":"stdio"}},"qualityScore":"0.550","qualityRationale":"deterministic score 0.55 from registry signals: · indexed on pulsemcp · has source repo · registry-generated description present","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:mcp:v1","enrichmentVersion":1,"enrichedAt":"2026-04-28T02:21:47.589Z","embedding":null,"createdAt":"2026-04-21T19:27:37.884Z","updatedAt":"2026-04-28T02:21:47.589Z","lastSeenAt":"2026-04-28T02:21:47.589Z","tsv":"'autom':68 'bridg':28 'capabl':5,17,76 'command':56 'consol':55 'databas':61 'execut':54 'exploit':9,21,47 'expos':2,14 'framework':4,16,31 'languag':33 'librari':38 'manag':10,22,46 'mcp' 'metasploit':3,15,30,60,74 'model':34 'msfrpc':40 'open-source' 'payload':48 'penetr':12,24,69 'profession':63 'protocol':41 'provid':43 'pymetasploit3':1,7,19,37 'queri':58 'requir':73 'secur':62 'server':27 'session':50 'test':13,25,70 'tool':44 'transport-stdio' 'use':65 'via':6,18 'well':52 'workflow':71","prices":[{"id":"4fcc831c-6e09-4ecb-940f-73bbb997ff72","listingId":"923eba83-ee17-4a53-b25a-27b05367f1da","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"mcp-free","isPrimary":true,"details":{"transport":"stdio"},"createdAt":"2026-04-21T19:27:37.884Z"}],"sources":[{"listingId":"923eba83-ee17-4a53-b25a-27b05367f1da","source":"pulsemcp","sourceId":"https://www.pulsemcp.com/servers/daedalus-pymetasploit3","sourceUrl":"https://api.pulsemcp.com/v0beta/servers","isPrimary":true,"firstSeenAt":"2026-04-21T19:27:37.884Z","lastSeenAt":"2026-04-28T02:21:47.589Z"}],"details":{"listingId":"923eba83-ee17-4a53-b25a-27b05367f1da","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"source":"pulsemcp","transport":"stdio","server_name":"Pymetasploit3","external_url":"null","github_stars":0,"registry_url":"https://www.pulsemcp.com/servers/daedalus-pymetasploit3","source_code_url":"https://github.com/daedalus/mcp-pymetasploit3"},"updatedAt":"2026-04-28T02:21:47.589Z"}}