MCP Hub
Back to servers

hexstrike-ai-community-edition

AI Powered penetration testing Platform for offensive security research

GitHub
Stars
50
Forks
12
Updated
Apr 10, 2026
Validated
Apr 12, 2026
HexStrike

HexStrike AI - Community Edition

AI-Powered Penetration Testing and Bug Bounty Automation Platform

Python License Security MCP

AI-powered cybersecurity platform that bridges MCP-compatible LLM agents with real-world offensive security tools for automated recon, vulnerability discovery, bug bounty workflows, and security research.

📡 Wiki

Join Discord Community

🚀 Differences from HexStrike V6

  • Bigger Arsenal + Better Agents: Expanded tool coverage, workflow skills, and specialist end-to-end agent systems.
  • Dashboard: Run tools, monitor health, stream logs, and export reports from one UI.
  • Global Command Palette (Ctrl/Cmd+K): Jump pages, trigger tools, and move faster with keyboard-first control.
  • Personalized Run Workflow: Favorite tools, recent targets, and quick compare with previous runs.
  • Persistent Run History: Server-side run history survives browser refresh/reset and clears safely with confirmation.
  • Intelligent Attack-Chain Engine (Precision-First): New catalog-driven planner with contextual learning, smarter tool ranking, and user-selectable precision (quick, comprehensive, stealth) before session creation.
  • Theme System Built In: One-click theme switcher with hover preview (Dark, Candy, Unicorn, Minimal, and more).
  • Performance Modes: --compact for lightweight/local LLM usage and --profile for targeted tool loading.
  • Core Improvements: Refactored architecture, updated dependencies, smarter parameter handling, and upgraded MCP orchestration (FastMCP v3).

Details

Web Dashboard

Served automatically at http://localhost:8888 the moment the server starts — no extra setup required.

What you get:

  • Dashboard — KPI cards for tools installed, command telemetry, uptime and more.
  • Tool Run — Run any tool, straight from the dashboard!
  • Reports — Searchable, filterable tool run history, with export.
  • Tool Registry — Searchable, filterable for all registered tools. Click any tool for more details.
  • Server Logs — near-realtime SSE log stream.
  • Help — IDE/agent configuration snippets for Claude Desktop, VS Code Copilot, Cursor, and OpenCode.
  • And much more!
dashboard reports reports reports
Compact Mode (--compact)

Activate Compact Mode for the MCP server using the --compact flag. See Flags for more info

  • 🚦 Only the two essential gateway tools are loaded—perfect for lightweight deployments, automation pipelines, or running on resource-constrained systems.
  • 🏃 Great for running with smaller, local LLMs or when you want minimal overhead.
Profile Mode (--profile)

Specify one or more profiles to load only the relevant ones for your workflow. See Profile flags for more info

  • 🚀 Select profiles for targeted workflows to speed up scans and reduce resource usage.
  • 🌐 Use --profile full to enable the complete arsenal, it's on default out-the-box for the recommended set.
End-to-end Agents

See Agents for more info

HTB CTF Agent System (@htb-ctf)

A 14-specialist agent system built natively for OpenCode, designed to autonomously solve HTB machines and CTF challenges end-to-end.

Bug Bounty Agent System (@bugbounty)

A 7-specialist agent system built natively for OpenCode, designed for autonomous bug bounty hunting across web, API, and broad wildcard scopes.

Recon Agent System (@recon)

A 5-specialist agent system built natively for OpenCode, designed for pure read-only information gathering across domains, IP addresses, web applications, and APIs.

Quickstart

Get the server and MCP client running in minutes for AI-powered penetration testing, recon automation, and bug bounty workflows.

Scripted Setup (recommended)

# Clone first
git clone https://github.com/CommonHuman-Lab/hexstrike-ai-community-edition.git
cd hexstrike-ai-community-edition

# Recommended default: update + install tools + start server
./scripts/install.sh -a

# Equivalent long form
# ./scripts/install.sh -s -t -r

See Installation Guide for other options.

Verify Setup

Browse http://localhost:8888

curl http://localhost:8888/health

Permissions Note

Some security tools (for example nmap and masscan) need elevated privileges for specific scan modes. Use a dedicated test VM and least-privilege setup where possible.

See Flags for runtime options and profile tuning.

MCP Integrations

Connect this platform to MCP-compatible AI clients for automated penetration testing, bug bounty workflows, and security research.

Universal MCP Command

Use this command pattern in clients that support local stdio MCP servers:

/path/to/hexstrike/hexstrike-env/bin/python3 /path/to/hexstrike/hexstrike_mcp.py --server http://127.0.0.1:8888 --profile full

OpenCode Example

{
  "$schema": "https://opencode.ai/config.json",
  "mcp": {
    "hexstrike": {
      "type": "local",
      "command": [
        "/path/to/hexstrike/hexstrike-env/bin/python3",
        "/path/to/hexstrike/hexstrike_mcp.py",
        "--server",
        "http://127.0.0.1:8888",
        "--profile",
        "full"
      ],
      "enabled": true
    }
  }
}
Claude Desktop / Cursor Example

Edit ~/.config/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "hexstrike": {
      "command": "/path/to/hexstrike/hexstrike-env/bin/python3",
      "args": [
        "/path/to/hexstrike/hexstrike_mcp.py",
        "--server",
        "http://localhost:8888",
        "--profile",
        "full"
      ],
      "description": "HexStrike AI Community Edition",
      "timeout": 300,
      "disabled": false
    }
  }
}
VS Code Copilot Example

Configure .vscode/settings.json:

{
  "servers": {
    "hexstrike": {
      "type": "stdio",
      "command": "/path/to/hexstrike/hexstrike-env/bin/python3",
      "args": [
        "/path/to/hexstrike/hexstrike_mcp.py",
        "--server",
        "http://localhost:8888",
        "--profile",
        "full"
      ]
    }
  },
  "inputs": []
}

Security Configuration

Network Binding

By default, the server binds to 127.0.0.1 (localhost only). To configure security:

# Set an API token (server will require Bearer auth on all requests)
export HEXSTRIKE_API_TOKEN=your-secret-token

# Optionally bind to all interfaces (NOT recommended without a token)
export HEXSTRIKE_HOST=0.0.0.0

# Start the server
python3 hexstrike_server.py

Features

Security Tools Arsenal

Categories:

🤖 Automated Recon & Enumeration
  • BBot – AI-powered reconnaissance and enumeration framework supporting subdomain discovery, module filtering, and safe/fast scanning
🗄️ Database Interaction & Querying
  • MySQL Query – Direct SQL querying and enumeration for MySQL/MariaDB databases
  • PostgreSQL Query – Direct SQL querying and enumeration for PostgreSQL databases
  • SQLite Query – Local file-based SQL querying for SQLite databases
🔍 Network Reconnaissance & Scanning
  • Nmap - Advanced port scanning with custom NSE scripts and service detection
  • Rustscan - Ultra-fast port scanner with intelligent rate limiting
  • Masscan - High-speed Internet-scale port scanning with banner grabbing
  • AutoRecon - Comprehensive automated reconnaissance with 35+ parameters
  • Amass - Advanced subdomain enumeration and OSINT gathering
  • Subfinder - Fast passive subdomain discovery with multiple sources
  • Fierce - DNS reconnaissance and zone transfer testing
  • DNSEnum - DNS information gathering and subdomain brute forcing
  • TheHarvester - Email and subdomain harvesting from multiple sources
  • ARP-Scan - Network discovery using ARP requests
  • NBTScan - NetBIOS name scanning and enumeration
  • RPCClient - RPC enumeration and null session testing
  • Whois - Domain and IP registration lookup for ownership and OSINT
  • Enum4linux - SMB enumeration with user, group, and share discovery
  • Enum4linux-ng - Advanced SMB enumeration with enhanced logging
  • SMBMap - SMB share enumeration and exploitation
  • Responder - LLMNR, NBT-NS and MDNS poisoner for credential harvesting
  • NetExec - Network service exploitation framework (formerly CrackMapExec)
📡 WiFi Penetration Testing
  • Aircrack-ng Suite:
  • Aircrack-ng - WPA/WPA2 PSK cracking from captured handshakes using dictionary attacks
  • Airmon-ng - Enable/disable monitor mode and kill interfering processes
  • Airodump-ng - Passive 802.11 packet capture for AP discovery and WPA handshake collection
  • Aireplay-ng - Packet injection for deauthentication, fake authentication, and ARP replay attacks
  • Airbase-ng - Rogue/soft access point creation for Evil Twin and client capture attacks
  • Airdecap-ng - Decrypt WEP/WPA/WPA2 encrypted pcap capture files

Modern WiFi Tools:

  • hcxdumptool - Clientless PMKID capture and WPA/WPA2 handshake collection (v7.0.0+)
  • hcxpcapngtool - Convert hcxdumptool pcapng output to hashcat -m 22000 format
  • EAPHammer - WPA-Enterprise Evil Twin for harvesting 802.1X EAP credentials
  • Wifite2 - Automated WiFi auditing with PMKID, handshake, and WPS attack support
  • Bettercap - WiFi recon, deauthentication, and Evil Twin via Bettercap wifi module
  • mdk4 - 802.11 protocol stress testing and WIDS/WIPS evasion validation
🌐 Web Application Security Testing
  • Gobuster - Directory, file, and DNS enumeration with intelligent wordlists
  • Dirsearch - Advanced directory and file discovery with enhanced logging
  • Feroxbuster - Recursive content discovery with intelligent filtering
  • FFuf - Fast web fuzzer with advanced filtering and parameter discovery
  • Dirb - Comprehensive web content scanner with recursive scanning
  • HTTPx - Fast HTTP probing and technology detection
  • Katana - Next-generation crawling and spidering with JavaScript support
  • Hakrawler - Fast web endpoint discovery and crawling
  • Gau - Get All URLs from multiple sources (Wayback, Common Crawl, etc.)
  • Waybackurls - Historical URL discovery from Wayback Machine
  • Nuclei - Fast vulnerability scanner with 4000+ templates
  • Nikto - Web server vulnerability scanner with comprehensive checks
  • SQLMap - Advanced automatic SQL injection testing with tamper scripts
  • WPScan - WordPress security scanner with vulnerability database
  • Arjun - HTTP parameter discovery with intelligent fuzzing
  • ParamSpider - Parameter mining from web archives
  • X8 - Hidden parameter discovery with advanced techniques
  • Jaeles - Advanced vulnerability scanning with custom signatures
  • Dalfox - Advanced XSS vulnerability scanning with DOM analysis
  • Wafw00f - Web application firewall fingerprinting
  • TestSSL - SSL/TLS configuration testing and vulnerability assessment
  • SSLScan - SSL/TLS cipher suite enumeration
  • SSLyze - Fast and comprehensive SSL/TLS configuration analyzer
  • Anew - Append new lines to files for efficient data processing
  • QSReplace - Query string parameter replacement for systematic testing
  • Uro - URL filtering and deduplication for efficient testing
  • Whatweb - Web technology identification with fingerprinting
  • JWT-Tool - JSON Web Token testing with algorithm confusion
  • GraphQL-Voyager - GraphQL schema exploration and introspection testing
  • Burp Suite Extensions - Custom extensions for advanced web testing
  • ZAP Proxy - OWASP ZAP integration for automated security scanning
  • Wfuzz - Web application fuzzer with advanced payload generation
  • Commix - Command injection exploitation tool with automated detection
  • NoSQLMap - NoSQL injection testing for MongoDB, CouchDB, etc.
  • Tplmap - Server-side template injection exploitation tool

🌐 Advanced Browser Agent:

  • Headless Chrome Automation - Full Chrome browser automation with Selenium
  • Screenshot Capture - Automated screenshot generation for visual inspection
  • DOM Analysis - Deep DOM tree analysis and JavaScript execution monitoring
  • Network Traffic Monitoring - Real-time network request/response logging
  • Security Header Analysis - Comprehensive security header validation
  • Form Detection & Analysis - Automatic form discovery and input field analysis
  • JavaScript Execution - Dynamic content analysis with full JavaScript support
  • Proxy Integration - Seamless integration with Burp Suite and other proxies
  • Multi-page Crawling - Intelligent web application spidering and mapping
  • Performance Metrics - Page load times, resource usage, and optimization insights
🔐 Authentication & Password Security
  • Hydra - Network login cracker supporting 50+ protocols
  • John the Ripper - Advanced password hash cracking with custom rules
  • Hashcat - World's fastest password recovery tool with GPU acceleration
  • Medusa - Speedy, parallel, modular login brute-forcer
  • Patator - Multi-purpose brute-forcer with advanced modules
  • NetExec - Swiss army knife for pentesting networks
  • SMBMap - SMB share enumeration and exploitation tool
  • Evil-WinRM - Windows Remote Management shell with PowerShell integration
  • HashID - Advanced hash algorithm identifier with confidence scoring
  • CrackStation - Online hash lookup integration
  • Ophcrack - Windows password cracker using rainbow tables
🔬 Binary Analysis & Reverse Engineering
  • GDB - GNU Debugger with Python scripting and exploit development support
  • GDB-PEDA - Python Exploit Development Assistance for GDB
  • GDB-GEF - GDB Enhanced Features for exploit development
  • Radare2 - Advanced reverse engineering framework with comprehensive analysis
  • Ghidra - NSA's software reverse engineering suite with headless analysis
  • IDA Free - Interactive disassembler with advanced analysis capabilities
  • Binary Ninja - Commercial reverse engineering platform
  • Binwalk - Firmware analysis and extraction tool with recursive extraction
  • ROPgadget - ROP/JOP gadget finder with advanced search capabilities
  • Ropper - ROP gadget finder and exploit development tool
  • One-Gadget - Find one-shot RCE gadgets in libc
  • Checksec - Binary security property checker with comprehensive analysis
  • Strings - Extract printable strings from binaries with filtering
  • Objdump - Display object file information with Intel syntax
  • Readelf - ELF file analyzer with detailed header information
  • XXD - Hex dump utility with advanced formatting
  • Hexdump - Hex viewer and editor with customizable output
  • Pwntools - CTF framework and exploit development library
  • Angr - Binary analysis platform with symbolic execution
  • Libc-Database - Libc identification and offset lookup tool
  • Pwninit - Automate binary exploitation setup
  • Volatility - Advanced memory forensics framework
  • MSFVenom - Metasploit payload generator with advanced encoding
  • UPX - Executable packer/unpacker for binary analysis
☁️ Cloud & Container Security
  • Prowler - AWS/Azure/GCP security assessment with compliance checks
  • Scout Suite - Multi-cloud security auditing for AWS, Azure, GCP, Alibaba Cloud
  • CloudMapper - AWS network visualization and security analysis
  • Pacu - AWS exploitation framework with comprehensive modules
  • Trivy - Comprehensive vulnerability scanner for containers and IaC
  • Clair - Container vulnerability analysis with detailed CVE reporting
  • Kube-Hunter - Kubernetes penetration testing with active/passive modes
  • Kube-Bench - CIS Kubernetes benchmark checker with remediation
  • Docker Bench Security - Docker security assessment following CIS benchmarks
  • Falco - Runtime security monitoring for containers and Kubernetes
  • Checkov - Infrastructure as code security scanning
  • Terrascan - Infrastructure security scanner with policy-as-code
  • CloudSploit - Cloud security scanning and monitoring
  • AWS CLI - Amazon Web Services command line with security operations
  • Azure CLI - Microsoft Azure command line with security assessment
  • GCloud - Google Cloud Platform command line with security tools
  • Kubectl - Kubernetes command line with security context analysis
  • Helm - Kubernetes package manager with security scanning
  • Istio - Service mesh security analysis and configuration assessment
  • OPA - Policy engine for cloud-native security and compliance
🏆 CTF & Forensics Tools
  • Volatility - Advanced memory forensics framework with comprehensive plugins
  • Volatility3 - Next-generation memory forensics with enhanced analysis
  • Foremost - File carving and data recovery with signature-based detection
  • PhotoRec - File recovery software with advanced carving capabilities
  • TestDisk - Disk partition recovery and repair tool
  • Steghide - Steganography detection and extraction with password support
  • Stegsolve - Steganography analysis tool with visual inspection
  • Zsteg - PNG/BMP steganography detection tool
  • Outguess - Universal steganographic tool for JPEG images
  • ExifTool - Metadata reader/writer for various file formats
  • Binwalk - Firmware analysis and reverse engineering with extraction
  • Scalpel - File carving tool with configurable headers and footers
  • Bulk Extractor - Digital forensics tool for extracting features
  • Autopsy - Digital forensics platform with timeline analysis
  • Sleuth Kit - Collection of command-line digital forensics tools

Cryptography & Hash Analysis:

  • John the Ripper - Password cracker with custom rules and advanced modes
  • Hashcat - GPU-accelerated password recovery with 300+ hash types
  • HashID - Hash type identification with confidence scoring
  • CyberChef - Web-based analysis toolkit for encoding and encryption
  • Cipher-Identifier - Automatic cipher type detection and analysis
  • Frequency-Analysis - Statistical cryptanalysis for substitution ciphers
  • RSATool - RSA key analysis and common attack implementations
  • FactorDB - Integer factorization database for cryptographic challenges
🔥 Bug Bounty & OSINT Arsenal
  • Amass - Advanced subdomain enumeration and OSINT gathering
  • Subfinder - Fast passive subdomain discovery with API integration
  • Hakrawler - Fast web endpoint discovery and crawling
  • HTTPx - Fast and multi-purpose HTTP toolkit with technology detection
  • ParamSpider - Mining parameters from web archives
  • Aquatone - Visual inspection of websites across hosts
  • Subjack - Subdomain takeover vulnerability checker
  • DNSEnum - DNS enumeration script with zone transfer capabilities
  • Fierce - Domain scanner for locating targets with DNS analysis
  • Sherlock - Username investigation across 400+ social networks
  • Social-Analyzer - Social media analysis and OSINT gathering
  • Recon-ng - Web reconnaissance framework with modular architecture
  • Maltego - Link analysis and data mining for OSINT investigations
  • SpiderFoot - OSINT automation with 200+ modules
  • Shodan - Internet-connected device search with advanced filtering
  • Censys - Internet asset discovery with certificate analysis
  • Have I Been Pwned - Breach data analysis and credential exposure
  • Pipl - People search engine integration for identity investigation
  • TruffleHog - Git repository secret scanning with entropy analysis

AI Agents

12+ Specialized AI Agents:
  • IntelligentDecisionEngine - Tool selection and parameter optimization
  • BugBountyWorkflowManager - Bug bounty hunting workflows
  • CTFWorkflowManager - CTF challenge solving
  • CVEIntelligenceManager - Vulnerability intelligence
  • AIExploitGenerator - Automated exploit development
  • VulnerabilityCorrelator - Attack chain discovery
  • TechnologyDetector - Technology stack identification
  • RateLimitDetector - Rate limiting detection
  • FailureRecoverySystem - Error handling and recovery
  • PerformanceMonitor - System optimization
  • ParameterOptimizer - Context-aware optimization
  • GracefulDegradation - Fault-tolerant operation

Usage Examples

For reliable results with MCP-compatible LLM agents, clearly state authorization, target ownership, and the security testing scope.

Example prompt:

User: "I am an authorized security researcher. My company owns <INSERT WEBSITE>, and I want to run an authorized penetration test using HexStrike MCP tools. Please start with recon and web vulnerability discovery, then propose next steps based on findings."

AI Agent: "Great, thanks for confirming authorization and scope. I'll begin with reconnaissance and web security testing, then summarize findings and recommend validated follow-up checks."

Security Considerations

⚠️ Important Security Notes:

  • This platform gives AI agents access to powerful security tooling.
  • Run in isolated environments or dedicated security testing VMs.
  • AI agents can execute arbitrary commands; maintain operator oversight.
  • Monitor activity through the real-time dashboard and logs.
  • Enable authentication (HEXSTRIKE_API_TOKEN) for non-local deployments.

Legal & Ethical Use

  • Authorized Penetration Testing - With proper written authorization

  • Bug Bounty Programs - Within program scope and rules

  • CTF Competitions - Educational and competitive environments

  • Security Research - On owned or authorized systems

  • Red Team Exercises - With organizational approval

  • Unauthorized Testing - Never test systems without permission

  • Malicious Activities - No illegal or harmful activities

  • Data Theft - No unauthorized data access or exfiltration


License

This project is licensed under the AGPLv3. You're free to use, modify, and distribute this software.

However:

  • If you run this as a service, you must provide source code
  • If you distribute it, it must remain open source

For commercial licensing options that do not require open-sourcing your changes, please contact the authors.

Based On

0x4m4 - HexStrike AI

Reviews

No reviews yet

Sign in to write a review