HexStrike AI - Community Edition
AI-Powered Penetration Testing and Bug Bounty Automation Platform
AI-powered cybersecurity platform that bridges MCP-compatible LLM agents with real-world offensive security tools for automated recon, vulnerability discovery, bug bounty workflows, and security research.
🚀 Differences from HexStrike V6
- Bigger Arsenal + Better Agents: Expanded tool coverage, workflow skills, and specialist end-to-end agent systems.
- Dashboard: Run tools, monitor health, stream logs, and export reports from one UI.
- Global Command Palette (
Ctrl/Cmd+K): Jump pages, trigger tools, and move faster with keyboard-first control. - Personalized Run Workflow: Favorite tools, recent targets, and quick compare with previous runs.
- Persistent Run History: Server-side run history survives browser refresh/reset and clears safely with confirmation.
- Intelligent Attack-Chain Engine (Precision-First): New catalog-driven planner with contextual learning, smarter tool ranking, and user-selectable precision (
quick,comprehensive,stealth) before session creation. - Theme System Built In: One-click theme switcher with hover preview (Dark, Candy, Unicorn, Minimal, and more).
- Performance Modes:
--compactfor lightweight/local LLM usage and--profilefor targeted tool loading. - Core Improvements: Refactored architecture, updated dependencies, smarter parameter handling, and upgraded MCP orchestration (FastMCP v3).
Details
Web Dashboard
Served automatically at http://localhost:8888 the moment the server starts — no extra setup required.
What you get:
- Dashboard — KPI cards for tools installed, command telemetry, uptime and more.
- Tool Run — Run any tool, straight from the dashboard!
- Reports — Searchable, filterable tool run history, with export.
- Tool Registry — Searchable, filterable for all registered tools. Click any tool for more details.
- Server Logs — near-realtime SSE log stream.
- Help — IDE/agent configuration snippets for Claude Desktop, VS Code Copilot, Cursor, and OpenCode.
- And much more!
Compact Mode (--compact)
Activate Compact Mode for the MCP server using the
--compactflag. See Flags for more info
- 🚦 Only the two essential gateway tools are loaded—perfect for lightweight deployments, automation pipelines, or running on resource-constrained systems.
- 🏃 Great for running with smaller, local LLMs or when you want minimal overhead.
Profile Mode (--profile)
Specify one or more profiles to load only the relevant ones for your workflow. See Profile flags for more info
- 🚀 Select profiles for targeted workflows to speed up scans and reduce resource usage.
- 🌐 Use --profile full to enable the complete arsenal, it's on default out-the-box for the recommended set.
End-to-end Agents
See Agents for more info
HTB CTF Agent System (@htb-ctf)
A 14-specialist agent system built natively for OpenCode, designed to autonomously solve HTB machines and CTF challenges end-to-end.
Bug Bounty Agent System (@bugbounty)
A 7-specialist agent system built natively for OpenCode, designed for autonomous bug bounty hunting across web, API, and broad wildcard scopes.
Recon Agent System (@recon)
A 5-specialist agent system built natively for OpenCode, designed for pure read-only information gathering across domains, IP addresses, web applications, and APIs.
Quickstart
Get the server and MCP client running in minutes for AI-powered penetration testing, recon automation, and bug bounty workflows.
Scripted Setup (recommended)
# Clone first
git clone https://github.com/CommonHuman-Lab/hexstrike-ai-community-edition.git
cd hexstrike-ai-community-edition
# Recommended default: update + install tools + start server
./scripts/install.sh -a
# Equivalent long form
# ./scripts/install.sh -s -t -r
See Installation Guide for other options.
Verify Setup
Browse http://localhost:8888
curl http://localhost:8888/health
Permissions Note
Some security tools (for example nmap and masscan) need elevated privileges for specific scan modes. Use a dedicated test VM and least-privilege setup where possible.
See Flags for runtime options and profile tuning.
MCP Integrations
Connect this platform to MCP-compatible AI clients for automated penetration testing, bug bounty workflows, and security research.
- Supported clients include OpenCode, Cursor, Claude Desktop, VS Code Copilot, Roo Code, and other MCP-compatible agents.
- Watch setup walkthrough: YouTube - HexStrike AI Installation & Demo
- Full client-specific guides: Wiki
Universal MCP Command
Use this command pattern in clients that support local stdio MCP servers:
/path/to/hexstrike/hexstrike-env/bin/python3 /path/to/hexstrike/hexstrike_mcp.py --server http://127.0.0.1:8888 --profile full
OpenCode Example
{
"$schema": "https://opencode.ai/config.json",
"mcp": {
"hexstrike": {
"type": "local",
"command": [
"/path/to/hexstrike/hexstrike-env/bin/python3",
"/path/to/hexstrike/hexstrike_mcp.py",
"--server",
"http://127.0.0.1:8888",
"--profile",
"full"
],
"enabled": true
}
}
}
Claude Desktop / Cursor Example
Edit ~/.config/Claude/claude_desktop_config.json:
{
"mcpServers": {
"hexstrike": {
"command": "/path/to/hexstrike/hexstrike-env/bin/python3",
"args": [
"/path/to/hexstrike/hexstrike_mcp.py",
"--server",
"http://localhost:8888",
"--profile",
"full"
],
"description": "HexStrike AI Community Edition",
"timeout": 300,
"disabled": false
}
}
}
VS Code Copilot Example
Configure .vscode/settings.json:
{
"servers": {
"hexstrike": {
"type": "stdio",
"command": "/path/to/hexstrike/hexstrike-env/bin/python3",
"args": [
"/path/to/hexstrike/hexstrike_mcp.py",
"--server",
"http://localhost:8888",
"--profile",
"full"
]
}
},
"inputs": []
}
Security Configuration
Network Binding
By default, the server binds to 127.0.0.1 (localhost only). To configure security:
# Set an API token (server will require Bearer auth on all requests)
export HEXSTRIKE_API_TOKEN=your-secret-token
# Optionally bind to all interfaces (NOT recommended without a token)
export HEXSTRIKE_HOST=0.0.0.0
# Start the server
python3 hexstrike_server.py
Features
Security Tools Arsenal
Categories:
🤖 Automated Recon & Enumeration
- BBot – AI-powered reconnaissance and enumeration framework supporting subdomain discovery, module filtering, and safe/fast scanning
🗄️ Database Interaction & Querying
- MySQL Query – Direct SQL querying and enumeration for MySQL/MariaDB databases
- PostgreSQL Query – Direct SQL querying and enumeration for PostgreSQL databases
- SQLite Query – Local file-based SQL querying for SQLite databases
🔍 Network Reconnaissance & Scanning
- Nmap - Advanced port scanning with custom NSE scripts and service detection
- Rustscan - Ultra-fast port scanner with intelligent rate limiting
- Masscan - High-speed Internet-scale port scanning with banner grabbing
- AutoRecon - Comprehensive automated reconnaissance with 35+ parameters
- Amass - Advanced subdomain enumeration and OSINT gathering
- Subfinder - Fast passive subdomain discovery with multiple sources
- Fierce - DNS reconnaissance and zone transfer testing
- DNSEnum - DNS information gathering and subdomain brute forcing
- TheHarvester - Email and subdomain harvesting from multiple sources
- ARP-Scan - Network discovery using ARP requests
- NBTScan - NetBIOS name scanning and enumeration
- RPCClient - RPC enumeration and null session testing
- Whois - Domain and IP registration lookup for ownership and OSINT
- Enum4linux - SMB enumeration with user, group, and share discovery
- Enum4linux-ng - Advanced SMB enumeration with enhanced logging
- SMBMap - SMB share enumeration and exploitation
- Responder - LLMNR, NBT-NS and MDNS poisoner for credential harvesting
- NetExec - Network service exploitation framework (formerly CrackMapExec)
📡 WiFi Penetration Testing
- Aircrack-ng Suite:
- Aircrack-ng - WPA/WPA2 PSK cracking from captured handshakes using dictionary attacks
- Airmon-ng - Enable/disable monitor mode and kill interfering processes
- Airodump-ng - Passive 802.11 packet capture for AP discovery and WPA handshake collection
- Aireplay-ng - Packet injection for deauthentication, fake authentication, and ARP replay attacks
- Airbase-ng - Rogue/soft access point creation for Evil Twin and client capture attacks
- Airdecap-ng - Decrypt WEP/WPA/WPA2 encrypted pcap capture files
Modern WiFi Tools:
- hcxdumptool - Clientless PMKID capture and WPA/WPA2 handshake collection (v7.0.0+)
- hcxpcapngtool - Convert hcxdumptool pcapng output to hashcat -m 22000 format
- EAPHammer - WPA-Enterprise Evil Twin for harvesting 802.1X EAP credentials
- Wifite2 - Automated WiFi auditing with PMKID, handshake, and WPS attack support
- Bettercap - WiFi recon, deauthentication, and Evil Twin via Bettercap wifi module
- mdk4 - 802.11 protocol stress testing and WIDS/WIPS evasion validation
🌐 Web Application Security Testing
- Gobuster - Directory, file, and DNS enumeration with intelligent wordlists
- Dirsearch - Advanced directory and file discovery with enhanced logging
- Feroxbuster - Recursive content discovery with intelligent filtering
- FFuf - Fast web fuzzer with advanced filtering and parameter discovery
- Dirb - Comprehensive web content scanner with recursive scanning
- HTTPx - Fast HTTP probing and technology detection
- Katana - Next-generation crawling and spidering with JavaScript support
- Hakrawler - Fast web endpoint discovery and crawling
- Gau - Get All URLs from multiple sources (Wayback, Common Crawl, etc.)
- Waybackurls - Historical URL discovery from Wayback Machine
- Nuclei - Fast vulnerability scanner with 4000+ templates
- Nikto - Web server vulnerability scanner with comprehensive checks
- SQLMap - Advanced automatic SQL injection testing with tamper scripts
- WPScan - WordPress security scanner with vulnerability database
- Arjun - HTTP parameter discovery with intelligent fuzzing
- ParamSpider - Parameter mining from web archives
- X8 - Hidden parameter discovery with advanced techniques
- Jaeles - Advanced vulnerability scanning with custom signatures
- Dalfox - Advanced XSS vulnerability scanning with DOM analysis
- Wafw00f - Web application firewall fingerprinting
- TestSSL - SSL/TLS configuration testing and vulnerability assessment
- SSLScan - SSL/TLS cipher suite enumeration
- SSLyze - Fast and comprehensive SSL/TLS configuration analyzer
- Anew - Append new lines to files for efficient data processing
- QSReplace - Query string parameter replacement for systematic testing
- Uro - URL filtering and deduplication for efficient testing
- Whatweb - Web technology identification with fingerprinting
- JWT-Tool - JSON Web Token testing with algorithm confusion
- GraphQL-Voyager - GraphQL schema exploration and introspection testing
- Burp Suite Extensions - Custom extensions for advanced web testing
- ZAP Proxy - OWASP ZAP integration for automated security scanning
- Wfuzz - Web application fuzzer with advanced payload generation
- Commix - Command injection exploitation tool with automated detection
- NoSQLMap - NoSQL injection testing for MongoDB, CouchDB, etc.
- Tplmap - Server-side template injection exploitation tool
🌐 Advanced Browser Agent:
- Headless Chrome Automation - Full Chrome browser automation with Selenium
- Screenshot Capture - Automated screenshot generation for visual inspection
- DOM Analysis - Deep DOM tree analysis and JavaScript execution monitoring
- Network Traffic Monitoring - Real-time network request/response logging
- Security Header Analysis - Comprehensive security header validation
- Form Detection & Analysis - Automatic form discovery and input field analysis
- JavaScript Execution - Dynamic content analysis with full JavaScript support
- Proxy Integration - Seamless integration with Burp Suite and other proxies
- Multi-page Crawling - Intelligent web application spidering and mapping
- Performance Metrics - Page load times, resource usage, and optimization insights
🔐 Authentication & Password Security
- Hydra - Network login cracker supporting 50+ protocols
- John the Ripper - Advanced password hash cracking with custom rules
- Hashcat - World's fastest password recovery tool with GPU acceleration
- Medusa - Speedy, parallel, modular login brute-forcer
- Patator - Multi-purpose brute-forcer with advanced modules
- NetExec - Swiss army knife for pentesting networks
- SMBMap - SMB share enumeration and exploitation tool
- Evil-WinRM - Windows Remote Management shell with PowerShell integration
- HashID - Advanced hash algorithm identifier with confidence scoring
- CrackStation - Online hash lookup integration
- Ophcrack - Windows password cracker using rainbow tables
🔬 Binary Analysis & Reverse Engineering
- GDB - GNU Debugger with Python scripting and exploit development support
- GDB-PEDA - Python Exploit Development Assistance for GDB
- GDB-GEF - GDB Enhanced Features for exploit development
- Radare2 - Advanced reverse engineering framework with comprehensive analysis
- Ghidra - NSA's software reverse engineering suite with headless analysis
- IDA Free - Interactive disassembler with advanced analysis capabilities
- Binary Ninja - Commercial reverse engineering platform
- Binwalk - Firmware analysis and extraction tool with recursive extraction
- ROPgadget - ROP/JOP gadget finder with advanced search capabilities
- Ropper - ROP gadget finder and exploit development tool
- One-Gadget - Find one-shot RCE gadgets in libc
- Checksec - Binary security property checker with comprehensive analysis
- Strings - Extract printable strings from binaries with filtering
- Objdump - Display object file information with Intel syntax
- Readelf - ELF file analyzer with detailed header information
- XXD - Hex dump utility with advanced formatting
- Hexdump - Hex viewer and editor with customizable output
- Pwntools - CTF framework and exploit development library
- Angr - Binary analysis platform with symbolic execution
- Libc-Database - Libc identification and offset lookup tool
- Pwninit - Automate binary exploitation setup
- Volatility - Advanced memory forensics framework
- MSFVenom - Metasploit payload generator with advanced encoding
- UPX - Executable packer/unpacker for binary analysis
☁️ Cloud & Container Security
- Prowler - AWS/Azure/GCP security assessment with compliance checks
- Scout Suite - Multi-cloud security auditing for AWS, Azure, GCP, Alibaba Cloud
- CloudMapper - AWS network visualization and security analysis
- Pacu - AWS exploitation framework with comprehensive modules
- Trivy - Comprehensive vulnerability scanner for containers and IaC
- Clair - Container vulnerability analysis with detailed CVE reporting
- Kube-Hunter - Kubernetes penetration testing with active/passive modes
- Kube-Bench - CIS Kubernetes benchmark checker with remediation
- Docker Bench Security - Docker security assessment following CIS benchmarks
- Falco - Runtime security monitoring for containers and Kubernetes
- Checkov - Infrastructure as code security scanning
- Terrascan - Infrastructure security scanner with policy-as-code
- CloudSploit - Cloud security scanning and monitoring
- AWS CLI - Amazon Web Services command line with security operations
- Azure CLI - Microsoft Azure command line with security assessment
- GCloud - Google Cloud Platform command line with security tools
- Kubectl - Kubernetes command line with security context analysis
- Helm - Kubernetes package manager with security scanning
- Istio - Service mesh security analysis and configuration assessment
- OPA - Policy engine for cloud-native security and compliance
🏆 CTF & Forensics Tools
- Volatility - Advanced memory forensics framework with comprehensive plugins
- Volatility3 - Next-generation memory forensics with enhanced analysis
- Foremost - File carving and data recovery with signature-based detection
- PhotoRec - File recovery software with advanced carving capabilities
- TestDisk - Disk partition recovery and repair tool
- Steghide - Steganography detection and extraction with password support
- Stegsolve - Steganography analysis tool with visual inspection
- Zsteg - PNG/BMP steganography detection tool
- Outguess - Universal steganographic tool for JPEG images
- ExifTool - Metadata reader/writer for various file formats
- Binwalk - Firmware analysis and reverse engineering with extraction
- Scalpel - File carving tool with configurable headers and footers
- Bulk Extractor - Digital forensics tool for extracting features
- Autopsy - Digital forensics platform with timeline analysis
- Sleuth Kit - Collection of command-line digital forensics tools
Cryptography & Hash Analysis:
- John the Ripper - Password cracker with custom rules and advanced modes
- Hashcat - GPU-accelerated password recovery with 300+ hash types
- HashID - Hash type identification with confidence scoring
- CyberChef - Web-based analysis toolkit for encoding and encryption
- Cipher-Identifier - Automatic cipher type detection and analysis
- Frequency-Analysis - Statistical cryptanalysis for substitution ciphers
- RSATool - RSA key analysis and common attack implementations
- FactorDB - Integer factorization database for cryptographic challenges
🔥 Bug Bounty & OSINT Arsenal
- Amass - Advanced subdomain enumeration and OSINT gathering
- Subfinder - Fast passive subdomain discovery with API integration
- Hakrawler - Fast web endpoint discovery and crawling
- HTTPx - Fast and multi-purpose HTTP toolkit with technology detection
- ParamSpider - Mining parameters from web archives
- Aquatone - Visual inspection of websites across hosts
- Subjack - Subdomain takeover vulnerability checker
- DNSEnum - DNS enumeration script with zone transfer capabilities
- Fierce - Domain scanner for locating targets with DNS analysis
- Sherlock - Username investigation across 400+ social networks
- Social-Analyzer - Social media analysis and OSINT gathering
- Recon-ng - Web reconnaissance framework with modular architecture
- Maltego - Link analysis and data mining for OSINT investigations
- SpiderFoot - OSINT automation with 200+ modules
- Shodan - Internet-connected device search with advanced filtering
- Censys - Internet asset discovery with certificate analysis
- Have I Been Pwned - Breach data analysis and credential exposure
- Pipl - People search engine integration for identity investigation
- TruffleHog - Git repository secret scanning with entropy analysis
AI Agents
12+ Specialized AI Agents:
- IntelligentDecisionEngine - Tool selection and parameter optimization
- BugBountyWorkflowManager - Bug bounty hunting workflows
- CTFWorkflowManager - CTF challenge solving
- CVEIntelligenceManager - Vulnerability intelligence
- AIExploitGenerator - Automated exploit development
- VulnerabilityCorrelator - Attack chain discovery
- TechnologyDetector - Technology stack identification
- RateLimitDetector - Rate limiting detection
- FailureRecoverySystem - Error handling and recovery
- PerformanceMonitor - System optimization
- ParameterOptimizer - Context-aware optimization
- GracefulDegradation - Fault-tolerant operation
Usage Examples
For reliable results with MCP-compatible LLM agents, clearly state authorization, target ownership, and the security testing scope.
Example prompt:
User: "I am an authorized security researcher. My company owns <INSERT WEBSITE>, and I want to run an authorized penetration test using HexStrike MCP tools. Please start with recon and web vulnerability discovery, then propose next steps based on findings."
AI Agent: "Great, thanks for confirming authorization and scope. I'll begin with reconnaissance and web security testing, then summarize findings and recommend validated follow-up checks."
Security Considerations
⚠️ Important Security Notes:
- This platform gives AI agents access to powerful security tooling.
- Run in isolated environments or dedicated security testing VMs.
- AI agents can execute arbitrary commands; maintain operator oversight.
- Monitor activity through the real-time dashboard and logs.
- Enable authentication (
HEXSTRIKE_API_TOKEN) for non-local deployments.
Legal & Ethical Use
-
✅ Authorized Penetration Testing - With proper written authorization
-
✅ Bug Bounty Programs - Within program scope and rules
-
✅ CTF Competitions - Educational and competitive environments
-
✅ Security Research - On owned or authorized systems
-
✅ Red Team Exercises - With organizational approval
-
❌ Unauthorized Testing - Never test systems without permission
-
❌ Malicious Activities - No illegal or harmful activities
-
❌ Data Theft - No unauthorized data access or exfiltration
License
This project is licensed under the AGPLv3. You're free to use, modify, and distribute this software.
However:
- If you run this as a service, you must provide source code
- If you distribute it, it must remain open source
For commercial licensing options that do not require open-sourcing your changes, please contact the authors.
Based On
0x4m4 - HexStrike AI