mythic_mcp

Mythic MCP is a demo tool that utilizes LLMs to perform automated penetration testing. It allows users to emulate specific threat actors and execute steps to achieve designated objectives. Users can configure the server by editing a configuration file and instruct the LLM with tasks. It promotes automation in security testing but poses risks of misuse, hence caution regarding safety is essential.

GitHub Stars

65

User Rating

Not Rated

Forks

15

Issues

3

Views

1

Favorites

0

README
Mythic MCP

A quick MCP demo for Mythic, allowing LLMs to pentest on our behalf!

Requirements
  1. uv
  2. python3
  3. Claude Desktop (or other MCP Client)
Usage with Claude Desktop

To deploy this MCP Server with Claude Desktop, you'll need to edit your claude_desktop_config.json to add the following:

{
    "mcpServers": {
        "mythic_mcp": {
            "command": "/Users/xpn/.local/bin/uv",
            "args": [
                "--directory",
                "/full/path/to/mythic_mcp/",
                "run",
                "main.py",
                "mythic_admin",
                "mythic_admin_password",
                "localhost",
                "7443"
            ]
        }
    }
}

Once done, kick off Claude Desktop. There are sample prompts to show how to task the LLM, but really anything will work along the lines of:

You are an automated pentester, tasked with emulating a specific threat actor. The threat actor is APT31. Your objective is: Add a flag to C:\win.txt on DC01. Perform any required steps to meet the objective, using only techniques documented by the threat actor.
Author Information
Adam Chester

|| RedTeamer and Infosec Researcher ||

SpecterOpsUK

2,078

Followers

38

Repositories

44

Gists

1

Total Contributions

Top Contributors

Threads