diff --git a/README.md b/README.md index d4e1bc4..b1808b5 100644 --- a/README.md +++ b/README.md @@ -3,7 +3,7 @@ HexStrike AI Logo # HexStrike AI MCP Agents v6.0 -### ๐Ÿ”ฅ **MAJOR UPDATE** - Enhanced AI-Powered Cybersecurity Platform +### AI-Powered Cybersecurity Automation Platform [![Python](https://img.shields.io/badge/Python-3.8%2B-blue.svg)](https://www.python.org/) [![License](https://img.shields.io/badge/License-MIT-green.svg)](LICENSE) @@ -11,95 +11,58 @@ [![MCP](https://img.shields.io/badge/MCP-Compatible-purple.svg)](https://github.com/0x4m4/hexstrike-ai) [![Version](https://img.shields.io/badge/Version-6.0.0-orange.svg)](https://github.com/0x4m4/hexstrike-ai/releases) [![Tools](https://img.shields.io/badge/Security%20Tools-150%2B-brightgreen.svg)](https://github.com/0x4m4/hexstrike-ai) -[![Intelligence](https://img.shields.io/badge/AI%20Intelligence-Advanced-blue.svg)](https://github.com/0x4m4/hexstrike-ai) [![Agents](https://img.shields.io/badge/AI%20Agents-12%2B-purple.svg)](https://github.com/0x4m4/hexstrike-ai) +[![Stars](https://img.shields.io/github/stars/0x4m4/hexstrike-ai?style=social)](https://github.com/0x4m4/hexstrike-ai) -**๐Ÿš€ World's Most Advanced AI-Powered Penetration Testing Framework with Autonomous Agents, Intelligent Decision Engine, and 150+ Security Tools** +**Advanced AI-powered penetration testing framework with 150+ security tools and 12+ autonomous AI agents** -[๏ฟฝ What's New](#-whats-new-in-v60) โ€ข [๐Ÿ—๏ธ Architecture](#๏ธ-architecture-overview) โ€ข [๐Ÿš€ Installation](#quick-installation) โ€ข [๐Ÿ› ๏ธ Features](#comprehensive-feature-set) โ€ข [๐Ÿค– AI Agents](#ai-agents--intelligent-automation) โ€ข [๐Ÿ“ก API Reference](#api-reference) โ€ข [โญ Star Us](https://github.com/0x4m4/hexstrike-ai) +[๐Ÿ“‹ What's New](#whats-new-in-v60) โ€ข [๐Ÿ—๏ธ Architecture](#architecture-overview) โ€ข [๐Ÿš€ Installation](#installation) โ€ข [๐Ÿ› ๏ธ Features](#features) โ€ข [๐Ÿค– AI Agents](#ai-agents) โ€ข [๐Ÿ“ก API Reference](#api-reference) --- -## ๐Ÿ”ฅ **What's New in v6.0** +## What's New in v6.0 -### **๐ŸŽฏ Major Enhancements & New Capabilities** +### Major Enhancements -
+- **150+ Security Tools** - Comprehensive security testing arsenal +- **12+ AI Agents** - Autonomous decision-making and workflow management +- **Intelligent Decision Engine** - AI-powered tool selection and parameter optimization +- **Modern Visual Engine** - Real-time dashboards and progress tracking +- **Advanced Process Management** - Smart caching and resource optimization +- **Vulnerability Intelligence** - CVE analysis and exploit generation -| ๐Ÿค– **12+ AI Agents** | ๐Ÿ› ๏ธ **150+ Security Tools** | ๐Ÿง  **Intelligent Decision Engine** | -|:---:|:---:|:---:| -| Autonomous penetration testing agents | Complete security testing arsenal | AI-powered tool selection & optimization | +### New AI Agents -| ๐ŸŽจ **Modern Visual Engine** | โšก **Advanced Process Management** | ๐Ÿ” **Vulnerability Intelligence** | -|:---:|:---:|:---:| -| Beautiful real-time output & dashboards | Smart caching & resource optimization | CVE analysis & exploit generation | - -
- -### **โœจ Revolutionary New Features:** - -#### **๐Ÿค– Autonomous AI Agents (NEW!)** - **IntelligentDecisionEngine** - AI-powered tool selection and parameter optimization - **BugBountyWorkflowManager** - Specialized workflows for bug bounty hunting -- **CTFWorkflowManager** - Automated CTF challenge solving with category-specific approaches -- **CVEIntelligenceManager** - Real-time vulnerability intelligence and exploit analysis -- **AIExploitGenerator** - Automated exploit development from CVE data -- **VulnerabilityCorrelator** - Multi-stage attack chain discovery and optimization -- **TechnologyDetector** - Advanced technology stack identification and analysis -- **RateLimitDetector** - Intelligent rate limiting detection and timing adjustment -- **FailureRecoverySystem** - Automatic error handling and alternative tool selection -- **PerformanceMonitor** - Real-time system optimization and resource allocation -- **ParameterOptimizer** - Context-aware parameter optimization for maximum effectiveness -- **GracefulDegradation** - Fault-tolerant operation with partial tool failures +- **CTFWorkflowManager** - Automated CTF challenge solving +- **CVEIntelligenceManager** - Real-time vulnerability intelligence +- **AIExploitGenerator** - Automated exploit development +- **VulnerabilityCorrelator** - Multi-stage attack chain discovery +- **TechnologyDetector** - Advanced technology stack identification +- **RateLimitDetector** - Intelligent rate limiting detection +- **FailureRecoverySystem** - Automatic error handling +- **PerformanceMonitor** - Real-time system optimization +- **ParameterOptimizer** - Context-aware parameter optimization +- **GracefulDegradation** - Fault-tolerant operation -#### **๐ŸŽจ Modern Visual Engine (ENHANCED!)** -- **Reddish Hacker Theme** - Professional cybersecurity aesthetic with blood-red accents -- **Real-time Progress Bars** - Beautiful animated progress indicators with ETA calculations -- **Live Dashboards** - Multi-process monitoring with system metrics and health status -- **Vulnerability Cards** - Color-coded severity indicators with detailed risk analysis -- **Enhanced Logging** - Emoji-rich, color-coded output with structured formatting -- **Terminal Animations** - Smooth animations and visual feedback for all operations +### New Security Tools -#### **โšก Advanced Process Management (NEW!)** -- **Smart Caching System** - Intelligent result caching with LRU eviction and TTL optimization -- **Process Pools** - Auto-scaling thread pools with intelligent resource allocation -- **Command Termination** - Real-time process control without server restart -- **Resource Monitoring** - CPU, memory, and network usage optimization -- **Error Recovery** - Automatic retry mechanisms with exponential backoff -- **Performance Analytics** - Detailed metrics and optimization recommendations - -#### **๐Ÿ” Vulnerability Intelligence System (NEW!)** -- **CVE Real-time Monitoring** - Automated CVE feed analysis with severity filtering -- **Exploitability Analysis** - AI-powered assessment of vulnerability exploitability -- **Attack Chain Discovery** - Multi-stage attack path identification and optimization -- **Threat Intelligence** - IOC correlation across multiple threat intelligence sources -- **Zero-Day Research** - Automated vulnerability pattern recognition and analysis -- **Exploit Database Integration** - Real-time exploit availability checking and correlation - -#### **๐Ÿ› ๏ธ Expanded Tool Arsenal (50+ NEW TOOLS!)** - **Network Security**: Rustscan, Masscan, AutoRecon, NetExec, Responder - **Web Application**: Katana, HTTPx, Feroxbuster, Arjun, ParamSpider, X8, Jaeles, Dalfox - **Cloud Security**: Prowler, Scout Suite, CloudMapper, Pacu, Trivy, Kube-Hunter, Kube-Bench - **Binary Analysis**: Ghidra, Radare2, Pwntools, ROPgadget, One_gadget, Angr, Volatility3 -- **API Testing**: GraphQL introspection, JWT manipulation, REST API fuzzing, WebSocket testing -- **CTF Specialized**: Advanced cryptography tools, steganography detection, forensics suite -- **OSINT & Reconnaissance**: Advanced subdomain enumeration, social media analysis, breach data correlation - -### **๐Ÿ“Š Impressive Statistics:** -- **150+ Security Tools** (up from 70+) - More than doubled our tool arsenal -- **12+ AI Agents** - Autonomous decision-making and workflow management -- **4000+ Vulnerability Templates** - Comprehensive coverage with Nuclei integration -- **35+ Attack Categories** - From web apps to cloud infrastructure -- **Real-time Processing** - Sub-second response times with intelligent caching -- **99.9% Uptime** - Fault-tolerant architecture with graceful degradation +- **API Testing**: GraphQL introspection, JWT manipulation, REST API fuzzing +- **CTF Specialized**: Advanced cryptography, steganography, forensics tools +- **OSINT & Reconnaissance**: Advanced subdomain enumeration, social media analysis --- -## ๐Ÿ—๏ธ **Enhanced Architecture Overview** +## Architecture Overview -HexStrike AI v6.0 features a **revolutionary multi-agent architecture** with autonomous AI agents, intelligent decision-making, and advanced vulnerability intelligence. This is the most sophisticated MCP server for cybersecurity automation. +HexStrike AI v6.0 features a multi-agent architecture with autonomous AI agents, intelligent decision-making, and advanced vulnerability intelligence. ```mermaid %%{init: {"themeVariables": { @@ -153,178 +116,232 @@ graph TD style E fill:#ff8a80,stroke:#b71c1c,stroke-width:2px,color:#fffde7 ``` -### **๐Ÿš€ Revolutionary Multi-Agent System:** - -#### **๐Ÿง  Intelligent Decision Engine** -- **AI-Powered Tool Selection** - Automatically chooses optimal tools based on target analysis -- **Context-Aware Optimization** - Adapts parameters based on technology stack and environment -- **Success Probability Calculation** - Predicts tool effectiveness before execution -- **Attack Chain Orchestration** - Plans multi-stage attacks for maximum impact - -#### **๐Ÿค– Autonomous AI Agents** -- **BugBountyWorkflowManager** - Specialized reconnaissance and vulnerability discovery -- **CTFWorkflowManager** - Category-specific challenge solving (web, crypto, pwn, forensics) -- **CVEIntelligenceManager** - Real-time vulnerability monitoring and analysis -- **AIExploitGenerator** - Automated exploit development from vulnerability data -- **TechnologyDetector** - Advanced fingerprinting and stack identification -- **ParameterOptimizer** - Dynamic parameter tuning for maximum effectiveness - -#### **โšก Advanced Process Management** -- **Smart Caching System** - Intelligent result caching with LRU eviction -- **Auto-scaling Process Pools** - Dynamic resource allocation based on system load -- **Real-time Monitoring** - Live dashboards with system metrics and health status -- **Graceful Degradation** - Fault-tolerant operation with automatic recovery - -### **๐ŸŽฏ How the Enhanced System Works:** +### How It Works 1. **AI Agent Connection** - Claude, GPT, or other MCP-compatible agents connect via FastMCP protocol 2. **Intelligent Analysis** - Decision engine analyzes targets and selects optimal testing strategies -3. **Autonomous Execution** - AI agents execute comprehensive security assessments without human intervention -4. **Real-time Adaptation** - System adapts based on results, failures, and discovered vulnerabilities -5. **Advanced Reporting** - Beautiful visual output with vulnerability cards and risk analysis -6. **Continuous Learning** - Agents improve their effectiveness based on historical success rates +3. **Autonomous Execution** - AI agents execute comprehensive security assessments +4. **Real-time Adaptation** - System adapts based on results and discovered vulnerabilities +5. **Advanced Reporting** - Visual output with vulnerability cards and risk analysis --- -## **๐Ÿš€ Why HexStrike AI v6.0 is Revolutionary** +## Installation -Transform your AI agents into **world-class cybersecurity experts** with the most advanced penetration testing framework ever created. HexStrike v6.0 represents a quantum leap in AI-powered security automation. +### System Requirements -### ๐ŸŽฏ **Perfect For:** -- ๐Ÿค– **AI Agent Developers** - Give your agents superhuman cybersecurity capabilities -- ๐Ÿ” **Autonomous Red Teams** - Deploy AI agents for comprehensive security assessments -- ๐Ÿ’ฐ **Bug Bounty Hunters** - AI-driven target analysis and vulnerability discovery at scale -- ๐Ÿ† **CTF Teams** - AI agents that solve challenges faster than human experts -- ๐Ÿ”ฌ **Security Researchers** - Automated vulnerability research and exploit development -- ๐Ÿข **Enterprise Security** - Continuous automated security testing and monitoring -- ๐Ÿ“š **Cybersecurity Education** - AI tutors with hands-on practical security experience -- ๐Ÿ›ก๏ธ **Threat Hunters** - AI-powered threat detection and incident response +```bash +OS: Kali Linux 2024.1+ / Ubuntu 22.04+ / Debian 12+ +Python: 3.9+ with pip (3.11+ recommended) +RAM: 8GB+ (16GB recommended) +Storage: 50GB+ free space +CPU: 4+ cores (8+ cores recommended) +Network: High-speed internet +GPU: Optional (for hashcat acceleration) +``` + +### Quick Setup + +```bash +# 1. Clone the repository +git clone https://github.com/0x4m4/hexstrike-ai.git +cd hexstrike-ai + +# 2. Create virtual environment +python3 -m venv hexstrike-env +source hexstrike-env/bin/activate # Linux/Mac +# hexstrike-env\Scripts\activate # Windows + +# 3. Install Python dependencies +pip3 install -r requirements.txt + +# 4. Install Browser Agent dependencies +pip3 install selenium beautifulsoup4 mitmproxy webdriver-manager +``` + +### Install Security Tools + +**Core Tools (Essential):** +```bash +# Network & Reconnaissance +sudo apt install nmap masscan rustscan amass subfinder nuclei fierce dnsenum +sudo apt install autorecon theharvester responder netexec enum4linux-ng + +# Web Application Security +sudo apt install gobuster feroxbuster dirsearch ffuf dirb httpx katana +sudo apt install nikto sqlmap wpscan arjun paramspider dalfox wafw00f + +# Password & Authentication +sudo apt install hydra john hashcat medusa patator crackmapexec +sudo apt install evil-winrm hash-identifier ophcrack + +# Binary Analysis & Reverse Engineering +sudo apt install gdb radare2 binwalk ghidra checksec strings objdump +sudo apt install volatility3 foremost steghide exiftool +``` + +**Cloud Security Tools:** +```bash +pip3 install prowler scout-suite trivy +sudo apt install kube-hunter kube-bench docker-bench-security +``` + +**Browser Agent Requirements:** +```bash +# Chrome/Chromium for Browser Agent +sudo apt install chromium-browser chromium-chromedriver +# OR install Google Chrome +wget -q -O - https://dl.google.com/linux/linux_signing_key.pub | sudo apt-key add - +echo "deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main" | sudo tee /etc/apt/sources.list.d/google-chrome.list +sudo apt update && sudo apt install google-chrome-stable +``` + +### Start the Server + +```bash +# Start the MCP server +python3 hexstrike_server.py + +# Optional: Start with debug mode +python3 hexstrike_server.py --debug + +# Optional: Custom port configuration +python3 hexstrike_server.py --port 8888 +``` + +### Verify Installation + +```bash +# Test server health +curl http://localhost:8888/health + +# Test AI agent capabilities +curl -X POST http://localhost:8888/api/intelligence/analyze-target \ + -H "Content-Type: application/json" \ + -d '{"target": "example.com", "analysis_type": "comprehensive"}' +``` --- -## **๐Ÿ”ฅ Revolutionary Capabilities** +## AI Integration Setup -
+### Claude Desktop Integration or Cursor -| ๐Ÿค– **12+ AI Agents** | ๐Ÿ› ๏ธ **150+ Security Tools** | ๐Ÿง  **Intelligent Decision Engine** | -|:---:|:---:|:---:| -| Autonomous penetration testing specialists | Complete enterprise security arsenal | AI-powered strategy and optimization | +Edit `~/.config/Claude/claude_desktop_config.json`: +```json +{ + "mcpServers": { + "hexstrike-ai": { + "command": "python3", + "args": [ + "/path/to/hexstrike-ai/hexstrike_mcp.py", + "--server", + "http://localhost:8888" + ], + "description": "HexStrike AI v6.0 - Advanced Cybersecurity Automation Platform", + "timeout": 300, + "disabled": false + } + } +} +``` -| ๐ŸŽจ **Modern Visual Engine** | โšก **Advanced Process Management** | ๐Ÿ” **Vulnerability Intelligence** | -|:---:|:---:|:---:| -| Beautiful real-time dashboards | Smart caching & resource optimization | CVE analysis & exploit generation | +### VS Code Copilot Integration -| ๐ŸŒ **API Security Testing** | ๐Ÿ† **CTF Automation** | โ˜๏ธ **Cloud Security** | -|:---:|:---:|:---:| -| GraphQL, JWT, REST API security | Automated challenge solving | AWS, Azure, GCP, Kubernetes | - -
- -### โœจ **What Makes HexStrike v6.0 Unstoppable:** - -#### **๐Ÿง  Autonomous Intelligence** -- **Zero Human Intervention** - AI agents handle complete security assessments from reconnaissance to exploitation -- **Self-Learning Capabilities** - Agents improve their effectiveness based on historical success rates and failure analysis -- **Adaptive Strategies** - Dynamic adjustment of testing approaches based on target responses and discovered vulnerabilities -- **Multi-Agent Coordination** - Specialized agents work together for comprehensive coverage and maximum efficiency - -#### **๐ŸŽจ Next-Generation User Experience** -- **Cinematic Visual Output** - Hollywood-style hacker interfaces with real-time animations and effects -- **Live Vulnerability Dashboards** - Real-time monitoring of discovered vulnerabilities with risk scoring -- **Interactive Progress Tracking** - Beautiful progress bars, ETA calculations, and process health monitoring -- **Professional Reporting** - Executive summaries, technical details, and proof-of-concept documentation - -#### **โšก Unmatched Performance** -- **Sub-Second Response Times** - Intelligent caching and optimization for lightning-fast operations -- **Massive Scalability** - Handle hundreds of concurrent scans with auto-scaling process pools -- **Fault-Tolerant Architecture** - Graceful degradation and automatic recovery from failures -- **Resource Optimization** - Smart memory management and CPU utilization for maximum efficiency - -#### **๐Ÿ” Advanced Threat Intelligence** -- **Real-time CVE Monitoring** - Automated vulnerability intelligence with exploitability analysis -- **Zero-Day Research** - AI-powered vulnerability pattern recognition and attack surface analysis -- **Threat Correlation** - Multi-source intelligence gathering and IOC correlation -- **Attack Chain Discovery** - Automated identification of multi-stage attack paths for maximum impact +Configure VS Code settings in `.vscode/settings.json`: +```json +{ + "servers": { + "hexstrike": { + "type": "stdio", + "command": "python3", + "args": [ + "/path/to/hexstrike-ai/hexstrike_mcp.py", + "--server", + "http://localhost:8888" + ] + } + }, + "inputs": [] +} +``` --- -## **๐Ÿ› ๏ธ Comprehensive Security Arsenal** +## Features -### ๐ŸŽฏ **150+ Professional Security Tools** +### Security Tools Arsenal -*HexStrike v6.0 features the most comprehensive collection of security tools ever assembled in a single platform, with intelligent AI agents that know exactly when and how to use each tool for maximum effectiveness.* +**150+ Professional Security Tools:**
-๐Ÿ” Network Reconnaissance & Scanning (20+ Tools) +๐Ÿ” Network Reconnaissance & Scanning (25+ Tools) -- **Nmap** - Advanced port scanning with custom NSE scripts, timing optimization, and comprehensive service detection -- **Nmap-Advanced** - Enhanced Nmap with custom NSE scripts, intelligent timing, and vulnerability detection -- **Rustscan** - Ultra-fast port scanner with intelligent rate limiting and script integration -- **Masscan** - High-speed Internet-scale port scanning with intelligent rate control and banner grabbing -- **AutoRecon** - Comprehensive automated reconnaissance with 35+ parameters and service-specific enumeration -- **Amass** - Advanced subdomain enumeration and OSINT gathering with multiple data sources -- **Subfinder** - Fast passive subdomain discovery with multiple sources and API integration -- **Sublist3r** - Subdomain enumeration using search engines and brute-force techniques -- **Fierce** - DNS reconnaissance and zone transfer testing with domain scanning capabilities -- **DNSRecon** - DNS enumeration and zone transfer testing with comprehensive record analysis -- **DNSEnum** - DNS information gathering and subdomain brute forcing with dictionary attacks -- **TheHarvester** - Email and subdomain harvesting from multiple public sources -- **ARP-Scan** - Network discovery using ARP requests with MAC address vendor identification -- **NBTScan** - NetBIOS name scanning and enumeration with share discovery -- **RPCClient** - RPC enumeration and null session testing with service interrogation +- **Nmap** - Advanced port scanning with custom NSE scripts and service detection +- **Rustscan** - Ultra-fast port scanner with intelligent rate limiting +- **Masscan** - High-speed Internet-scale port scanning with banner grabbing +- **AutoRecon** - Comprehensive automated reconnaissance with 35+ parameters +- **Amass** - Advanced subdomain enumeration and OSINT gathering +- **Subfinder** - Fast passive subdomain discovery with multiple sources +- **Fierce** - DNS reconnaissance and zone transfer testing +- **DNSEnum** - DNS information gathering and subdomain brute forcing +- **TheHarvester** - Email and subdomain harvesting from multiple sources +- **ARP-Scan** - Network discovery using ARP requests +- **NBTScan** - NetBIOS name scanning and enumeration +- **RPCClient** - RPC enumeration and null session testing - **Enum4linux** - SMB enumeration with user, group, and share discovery -- **Enum4linux-ng** - Advanced SMB enumeration with enhanced logging and modern techniques -- **SMBMap** - SMB share enumeration and exploitation with permission testing -- **Responder** - LLMNR, NBT-NS and MDNS poisoner for credential harvesting and relay attacks -- **NetExec** - Network service exploitation framework (formerly CrackMapExec) with credential spraying +- **Enum4linux-ng** - Advanced SMB enumeration with enhanced logging +- **SMBMap** - SMB share enumeration and exploitation +- **Responder** - LLMNR, NBT-NS and MDNS poisoner for credential harvesting +- **NetExec** - Network service exploitation framework (formerly CrackMapExec)
-๐ŸŒ Web Application Security Testing (35+ Tools) +๐ŸŒ Web Application Security Testing (40+ Tools) -- **Gobuster** - Directory, file, and DNS enumeration with intelligent wordlists and extension discovery -- **Dirsearch** - Advanced directory and file discovery with enhanced logging and recursive scanning -- **Feroxbuster** - Recursive content discovery with intelligent filtering and rate limiting -- **FFuf** - Fast web fuzzer with advanced filtering, match conditions, and parameter discovery -- **Dirb** - Comprehensive web content scanner with recursive scanning and custom wordlists -- **HTTPx** - Fast HTTP probing and technology detection with custom headers and status analysis -- **Katana** - Next-generation crawling and spidering with JavaScript support and form extraction -- **Hakrawler** - Fast web endpoint discovery and crawling with JavaScript execution -- **Gau** - Get All URLs from multiple sources (Wayback, Common Crawl, VirusTotal, etc.) -- **Waybackurls** - Historical URL discovery from Wayback Machine with version filtering -- **Nuclei** - Fast vulnerability scanner with 4000+ templates, custom rules, and severity filtering -- **Nikto** - Web server vulnerability scanner with comprehensive checks and plugin support -- **SQLMap** - Advanced automatic SQL injection testing with tamper scripts and database-specific techniques -- **WPScan** - WordPress security scanner with vulnerability database and brute-force capabilities -- **Arjun** - HTTP parameter discovery with intelligent fuzzing and context-aware testing -- **ParamSpider** - Parameter mining from web archives with enhanced discovery techniques -- **X8** - Hidden parameter discovery with advanced techniques and custom wordlists -- **Jaeles** - Advanced vulnerability scanning with custom signatures and intelligent detection -- **Dalfox** - Advanced XSS vulnerability scanning with DOM analysis and custom payloads -- **Wafw00f** - Web application firewall fingerprinting and bypass technique identification -- **TestSSL** - SSL/TLS configuration testing and vulnerability assessment with cipher analysis -- **SSLScan** - SSL/TLS cipher suite enumeration and protocol analysis -- **SSLyze** - Fast and comprehensive SSL/TLS configuration analyzer with certificate validation -- **Anew** - Append new lines to files for efficient data processing and deduplication -- **QSReplace** - Query string parameter replacement for systematic testing and fuzzing -- **Uro** - URL filtering and deduplication for efficient testing and reduced noise -- **Whatweb** - Web technology identification with fingerprinting and version detection -- **JWT-Tool** - JSON Web Token testing with algorithm confusion and signature bypass +- **Gobuster** - Directory, file, and DNS enumeration with intelligent wordlists +- **Dirsearch** - Advanced directory and file discovery with enhanced logging +- **Feroxbuster** - Recursive content discovery with intelligent filtering +- **FFuf** - Fast web fuzzer with advanced filtering and parameter discovery +- **Dirb** - Comprehensive web content scanner with recursive scanning +- **HTTPx** - Fast HTTP probing and technology detection +- **Katana** - Next-generation crawling and spidering with JavaScript support +- **Hakrawler** - Fast web endpoint discovery and crawling +- **Gau** - Get All URLs from multiple sources (Wayback, Common Crawl, etc.) +- **Waybackurls** - Historical URL discovery from Wayback Machine +- **Nuclei** - Fast vulnerability scanner with 4000+ templates +- **Nikto** - Web server vulnerability scanner with comprehensive checks +- **SQLMap** - Advanced automatic SQL injection testing with tamper scripts +- **WPScan** - WordPress security scanner with vulnerability database +- **Arjun** - HTTP parameter discovery with intelligent fuzzing +- **ParamSpider** - Parameter mining from web archives +- **X8** - Hidden parameter discovery with advanced techniques +- **Jaeles** - Advanced vulnerability scanning with custom signatures +- **Dalfox** - Advanced XSS vulnerability scanning with DOM analysis +- **Wafw00f** - Web application firewall fingerprinting +- **TestSSL** - SSL/TLS configuration testing and vulnerability assessment +- **SSLScan** - SSL/TLS cipher suite enumeration +- **SSLyze** - Fast and comprehensive SSL/TLS configuration analyzer +- **Anew** - Append new lines to files for efficient data processing +- **QSReplace** - Query string parameter replacement for systematic testing +- **Uro** - URL filtering and deduplication for efficient testing +- **Whatweb** - Web technology identification with fingerprinting +- **JWT-Tool** - JSON Web Token testing with algorithm confusion - **GraphQL-Voyager** - GraphQL schema exploration and introspection testing -- **Burp Suite Extensions** - Custom extensions for advanced web application testing +- **Burp Suite Extensions** - Custom extensions for advanced web testing - **ZAP Proxy** - OWASP ZAP integration for automated security scanning - **Wfuzz** - Web application fuzzer with advanced payload generation - **Commix** - Command injection exploitation tool with automated detection -- **NoSQLMap** - NoSQL injection testing tool for MongoDB, CouchDB, and other NoSQL databases +- **NoSQLMap** - NoSQL injection testing for MongoDB, CouchDB, etc. - **Tplmap** - Server-side template injection exploitation tool -**๐ŸŒ Advanced Browser Agent (NEW!):** -- **Headless Chrome Automation** - Full Chrome browser automation with Selenium WebDriver +**๐ŸŒ Advanced Browser Agent:** +- **Headless Chrome Automation** - Full Chrome browser automation with Selenium - **Screenshot Capture** - Automated screenshot generation for visual inspection - **DOM Analysis** - Deep DOM tree analysis and JavaScript execution monitoring - **Network Traffic Monitoring** - Real-time network request/response logging -- **Security Header Analysis** - Comprehensive security header validation and reporting +- **Security Header Analysis** - Comprehensive security header validation - **Form Detection & Analysis** - Automatic form discovery and input field analysis - **JavaScript Execution** - Dynamic content analysis with full JavaScript support - **Proxy Integration** - Seamless integration with Burp Suite and other proxies @@ -336,54 +353,79 @@ Transform your AI agents into **world-class cybersecurity experts** with the mos
๐Ÿ” Authentication & Password Security (12+ Tools) -- **Hydra** - Network login cracker supporting 50+ protocols with intelligent timing and rate limiting -- **John the Ripper** - Advanced password hash cracking with custom rules and wordlist optimization -- **Hashcat** - World's fastest password recovery tool with GPU acceleration and advanced attack modes -- **Medusa** - Speedy, parallel, modular login brute-forcer with protocol-specific optimizations -- **Patator** - Multi-purpose brute-forcer with advanced modules and intelligent retry mechanisms -- **NetExec** - Swiss army knife for pentesting networks (formerly CrackMapExec) with credential spraying -- **SMBMap** - SMB share enumeration and exploitation tool with permission testing -- **Evil-WinRM** - Windows Remote Management shell with advanced features and PowerShell integration -- **Hash-Identifier** - Hash type identification tool for determining hash algorithms +- **Hydra** - Network login cracker supporting 50+ protocols +- **John the Ripper** - Advanced password hash cracking with custom rules +- **Hashcat** - World's fastest password recovery tool with GPU acceleration +- **Medusa** - Speedy, parallel, modular login brute-forcer +- **Patator** - Multi-purpose brute-forcer with advanced modules +- **NetExec** - Swiss army knife for pentesting networks +- **SMBMap** - SMB share enumeration and exploitation tool +- **Evil-WinRM** - Windows Remote Management shell with PowerShell integration +- **Hash-Identifier** - Hash type identification tool - **HashID** - Advanced hash algorithm identifier with confidence scoring -- **CrackStation** - Online hash lookup integration for rapid hash cracking -- **Ophcrack** - Windows password cracker using rainbow tables and LM/NTLM hashes +- **CrackStation** - Online hash lookup integration +- **Ophcrack** - Windows password cracker using rainbow tables
๐Ÿ”ฌ Binary Analysis & Reverse Engineering (25+ Tools) -- **GDB** - GNU Debugger with Python scripting, enhanced logging, and exploit development support -- **GDB-PEDA** - Python Exploit Development Assistance for GDB with advanced debugging features -- **GDB-GEF** - GDB Enhanced Features for exploit development with modern interface -- **GDB-PWNdbg** - Advanced GDB plugin for exploit development with enhanced visualization -- **Radare2** - Advanced reverse engineering framework with comprehensive analysis and scripting -- **Ghidra** - NSA's software reverse engineering suite with headless analysis and decompilation +- **GDB** - GNU Debugger with Python scripting and exploit development support +- **GDB-PEDA** - Python Exploit Development Assistance for GDB +- **GDB-GEF** - GDB Enhanced Features for exploit development +- **Radare2** - Advanced reverse engineering framework with comprehensive analysis +- **Ghidra** - NSA's software reverse engineering suite with headless analysis - **IDA Free** - Interactive disassembler with advanced analysis capabilities -- **Binary Ninja** - Commercial reverse engineering platform with intermediate language -- **Binwalk** - Firmware analysis and extraction tool with recursive extraction and entropy analysis -- **ROPgadget** - ROP/JOP gadget finder with advanced search capabilities and chain generation -- **Ropper** - ROP gadget finder and exploit development tool with semantic analysis -- **One-Gadget** - Find one-shot RCE gadgets in libc with constraint analysis -- **Checksec** - Binary security property checker with comprehensive analysis and reporting -- **Strings** - Extract printable strings from binaries with filtering and encoding detection -- **Objdump** - Display object file information with Intel syntax and section analysis -- **Readelf** - ELF file analyzer with detailed header and section information -- **XXD** - Hex dump utility with advanced formatting and binary editing -- **Hexdump** - Hex viewer and editor with customizable output formats -- **Pwntools** - CTF framework and exploit development library with automation capabilities -- **Angr** - Binary analysis platform with symbolic execution and constraint solving -- **Libc-Database** - Libc identification and offset lookup tool with version detection -- **Pwninit** - Automate binary exploitation setup with template generation -- **Volatility** - Advanced memory forensics framework with comprehensive plugin support -- **MSFVenom** - Metasploit payload generator with advanced encoding and evasion -- **UPX** - Executable packer/unpacker for binary analysis and modification +- **Binary Ninja** - Commercial reverse engineering platform +- **Binwalk** - Firmware analysis and extraction tool with recursive extraction +- **ROPgadget** - ROP/JOP gadget finder with advanced search capabilities +- **Ropper** - ROP gadget finder and exploit development tool +- **One-Gadget** - Find one-shot RCE gadgets in libc +- **Checksec** - Binary security property checker with comprehensive analysis +- **Strings** - Extract printable strings from binaries with filtering +- **Objdump** - Display object file information with Intel syntax +- **Readelf** - ELF file analyzer with detailed header information +- **XXD** - Hex dump utility with advanced formatting +- **Hexdump** - Hex viewer and editor with customizable output +- **Pwntools** - CTF framework and exploit development library +- **Angr** - Binary analysis platform with symbolic execution +- **Libc-Database** - Libc identification and offset lookup tool +- **Pwninit** - Automate binary exploitation setup +- **Volatility** - Advanced memory forensics framework +- **MSFVenom** - Metasploit payload generator with advanced encoding +- **UPX** - Executable packer/unpacker for binary analysis
-๐Ÿ† Advanced CTF & Forensics Tools (15 Tools) +โ˜๏ธ Cloud & Container Security (20+ Tools) + +- **Prowler** - AWS/Azure/GCP security assessment with compliance checks +- **Scout Suite** - Multi-cloud security auditing for AWS, Azure, GCP, Alibaba Cloud +- **CloudMapper** - AWS network visualization and security analysis +- **Pacu** - AWS exploitation framework with comprehensive modules +- **Trivy** - Comprehensive vulnerability scanner for containers and IaC +- **Clair** - Container vulnerability analysis with detailed CVE reporting +- **Kube-Hunter** - Kubernetes penetration testing with active/passive modes +- **Kube-Bench** - CIS Kubernetes benchmark checker with remediation +- **Docker Bench Security** - Docker security assessment following CIS benchmarks +- **Falco** - Runtime security monitoring for containers and Kubernetes +- **Checkov** - Infrastructure as code security scanning +- **Terrascan** - Infrastructure security scanner with policy-as-code +- **CloudSploit** - Cloud security scanning and monitoring +- **AWS CLI** - Amazon Web Services command line with security operations +- **Azure CLI** - Microsoft Azure command line with security assessment +- **GCloud** - Google Cloud Platform command line with security tools +- **Kubectl** - Kubernetes command line with security context analysis +- **Helm** - Kubernetes package manager with security scanning +- **Istio** - Service mesh security analysis and configuration assessment +- **OPA** - Policy engine for cloud-native security and compliance + +
+ +
+๐Ÿ† Advanced CTF & Forensics Tools (20+ Tools) - **Volatility** - Advanced memory forensics framework with comprehensive plugins - **Volatility3** - Next-generation memory forensics with enhanced analysis @@ -401,693 +443,176 @@ Transform your AI agents into **world-class cybersecurity experts** with the mos - **Autopsy** - Digital forensics platform with timeline analysis - **Sleuth Kit** - Collection of command-line digital forensics tools -
- -
-โ˜๏ธ Cloud & Container Security (20+ Tools) - -- **Prowler** - AWS/Azure/GCP security assessment tool with comprehensive compliance checks -- **Scout Suite** - Multi-cloud security auditing tool for AWS, Azure, GCP, Alibaba Cloud, and Oracle Cloud -- **CloudMapper** - AWS network visualization and security analysis with attack path identification -- **Pacu** - AWS exploitation framework with comprehensive post-exploitation modules -- **Trivy** - Comprehensive vulnerability scanner for containers, filesystems, and infrastructure as code -- **Clair** - Container vulnerability analysis with detailed CVE reporting -- **Kube-Hunter** - Kubernetes penetration testing tool with active and passive scanning modes -- **Kube-Bench** - CIS Kubernetes benchmark checker with automated remediation suggestions -- **Docker Bench Security** - Docker security assessment tool following CIS benchmarks -- **Falco** - Runtime security monitoring for containers and Kubernetes with rule-based detection -- **Checkov** - Infrastructure as code security scanning for Terraform, CloudFormation, and Kubernetes -- **Terrascan** - Infrastructure security scanner with policy-as-code approach -- **CloudSploit** - Cloud security scanning and monitoring with continuous assessment -- **AWS CLI** - Amazon Web Services command line interface with security-focused operations -- **Azure CLI** - Microsoft Azure command line interface with security assessment capabilities -- **GCloud** - Google Cloud Platform command line with security and compliance tools -- **Kubectl** - Kubernetes command line tool with security context analysis -- **Helm** - Kubernetes package manager with security scanning for charts -- **Istio** - Service mesh security analysis and configuration assessment -- **OPA (Open Policy Agent)** - Policy engine for cloud-native security and compliance - -
- -
-๐Ÿ•ต๏ธ Forensics & Steganography (15+ Tools) - -- **Volatility** - Advanced memory forensics framework with comprehensive plugins for Windows, Linux, and macOS -- **Volatility3** - Next-generation memory forensics with enhanced analysis and modern architecture -- **Foremost** - File carving and data recovery with signature-based detection for multiple file types -- **PhotoRec** - File recovery software with advanced carving capabilities for 400+ file formats -- **TestDisk** - Disk partition recovery and repair tool with filesystem analysis -- **Steghide** - Steganography detection and extraction with password support for JPEG and BMP -- **Stegsolve** - Steganography analysis tool with visual inspection and bit-plane analysis -- **Zsteg** - PNG/BMP steganography detection tool with LSB analysis -- **Outguess** - Universal steganographic tool for JPEG images with statistical analysis -- **ExifTool** - Metadata reader/writer for various file formats with comprehensive tag support -- **Binwalk** - Firmware analysis and reverse engineering with extraction and entropy analysis -- **Scalpel** - File carving tool with configurable headers and footers for custom file types -- **Bulk Extractor** - Digital forensics tool for extracting features like email addresses and URLs -- **Autopsy** - Digital forensics platform with timeline analysis and case management -- **Sleuth Kit** - Collection of command-line digital forensics tools for filesystem analysis - -
- -
-๐Ÿ† Advanced CTF & Competition Tools (25+ Tools) - **Cryptography & Hash Analysis:** -- **John the Ripper** - Password cracker with custom rules and advanced attack modes -- **Hashcat** - GPU-accelerated password recovery with support for 300+ hash types +- **John the Ripper** - Password cracker with custom rules and advanced modes +- **Hashcat** - GPU-accelerated password recovery with 300+ hash types - **Hash-Identifier** - Hash type identification with confidence scoring -- **CyberChef** - Web-based analysis toolkit for encoding, encryption, and data manipulation +- **CyberChef** - Web-based analysis toolkit for encoding and encryption - **Cipher-Identifier** - Automatic cipher type detection and analysis - **Frequency-Analysis** - Statistical cryptanalysis for substitution ciphers - **RSATool** - RSA key analysis and common attack implementations - **FactorDB** - Integer factorization database for cryptographic challenges -**Steganography & Hidden Data:** -- **Steghide** - Advanced steganography with password protection and multiple algorithms -- **StegSolve** - Image steganography solver with bit-plane analysis and filters -- **Zsteg** - PNG/BMP steganography detection with comprehensive LSB analysis -- **Outguess** - JPEG steganography detection with statistical analysis -- **Binwalk** - Firmware and file analysis with recursive extraction capabilities -- **Strings** - String extraction with encoding detection and filtering - -**Miscellaneous & Esoteric:** -- **QR-Decoder** - QR code and barcode decoder with error correction -- **Audio-Analysis** - Audio spectrum analysis and hidden data detection -- **Brainfuck** - Brainfuck programming language interpreter -- **Whitespace** - Whitespace programming language interpreter -- **Base64/32/16** - Multi-format encoding/decoding utilities -- **ROT13** - Caesar cipher variants and rotation analysis -- **Morse Code** - Morse code encoder/decoder with audio support -- **Binary-Text** - Binary to text conversion with multiple encodings -- **Hex-ASCII** - Hexadecimal to ASCII conversion utilities -
๐Ÿ”ฅ Bug Bounty & OSINT Arsenal (20+ Tools) -- **Amass** - Advanced subdomain enumeration and OSINT gathering with multiple data sources -- **Subfinder** - Fast passive subdomain discovery with API integration for 30+ sources -- **Hakrawler** - Fast web endpoint discovery and crawling with JavaScript execution +- **Amass** - Advanced subdomain enumeration and OSINT gathering +- **Subfinder** - Fast passive subdomain discovery with API integration +- **Hakrawler** - Fast web endpoint discovery and crawling - **HTTPx** - Fast and multi-purpose HTTP toolkit with technology detection -- **ParamSpider** - Mining parameters from web archives with enhanced discovery techniques -- **Aquatone** - Visual inspection of websites across hosts with screenshot capabilities -- **Subjack** - Subdomain takeover vulnerability checker with service fingerprinting -- **DNSEnum** - DNS enumeration script with zone transfer and brute-force capabilities +- **ParamSpider** - Mining parameters from web archives +- **Aquatone** - Visual inspection of websites across hosts +- **Subjack** - Subdomain takeover vulnerability checker +- **DNSEnum** - DNS enumeration script with zone transfer capabilities - **Fierce** - Domain scanner for locating targets with DNS analysis -- **TheHarvester** - Email and subdomain harvesting from multiple public sources +- **TheHarvester** - Email and subdomain harvesting from multiple sources - **Sherlock** - Username investigation across 400+ social networks - **Social-Analyzer** - Social media analysis and OSINT gathering - **Recon-ng** - Web reconnaissance framework with modular architecture - **Maltego** - Link analysis and data mining for OSINT investigations -- **SpiderFoot** - OSINT automation with 200+ modules for data collection +- **SpiderFoot** - OSINT automation with 200+ modules - **Shodan** - Internet-connected device search with advanced filtering -- **Censys** - Internet asset discovery with certificate and service analysis -- **Have I Been Pwned** - Breach data analysis and credential exposure checking +- **Censys** - Internet asset discovery with certificate analysis +- **Have I Been Pwned** - Breach data analysis and credential exposure - **Pipl** - People search engine integration for identity investigation - **TruffleHog** - Git repository secret scanning with entropy analysis
-
-๐Ÿง  Advanced Vulnerability Intelligence (v6.0 NEW!) +### AI Agents -- **CVE Intelligence** - Real-time CVE monitoring with AI exploitability analysis -- **Exploit Generation** - AI-powered exploit development from vulnerability data -- **Attack Chain Discovery** - Multi-stage attack path identification and optimization -- **Threat Intelligence** - Advanced IOC correlation across multiple sources -- **Zero-Day Research** - Automated vulnerability research and pattern recognition -- **Advanced Payloads** - Nation-state level evasion techniques and obfuscation -- **Threat Hunting** - AI-assisted threat hunting with vulnerability correlation +**12+ Specialized AI Agents:** -
+- **IntelligentDecisionEngine** - Tool selection and parameter optimization +- **BugBountyWorkflowManager** - Bug bounty hunting workflows +- **CTFWorkflowManager** - CTF challenge solving +- **CVEIntelligenceManager** - Vulnerability intelligence +- **AIExploitGenerator** - Automated exploit development +- **VulnerabilityCorrelator** - Attack chain discovery +- **TechnologyDetector** - Technology stack identification +- **RateLimitDetector** - Rate limiting detection +- **FailureRecoverySystem** - Error handling and recovery +- **PerformanceMonitor** - System optimization +- **ParameterOptimizer** - Context-aware optimization +- **GracefulDegradation** - Fault-tolerant operation + +### Advanced Features + +- **Smart Caching System** - Intelligent result caching with LRU eviction +- **Real-time Process Management** - Live command control and monitoring +- **Vulnerability Intelligence** - CVE monitoring and exploit analysis +- **Browser Agent** - Headless Chrome automation for web testing +- **API Security Testing** - GraphQL, JWT, REST API security assessment +- **Modern Visual Engine** - Real-time dashboards and progress tracking --- -## ๏ฟฝ ***AI Agents & Intelligent Automation** +## AI Agents -### **๐Ÿง  Revolutionary Multi-Agent Architecture** +### Autonomous Capabilities -HexStrike v6.0 introduces **12+ specialized AI agents** that work together to provide autonomous cybersecurity capabilities. Each agent is an expert in specific domains, working collaboratively to deliver comprehensive security assessments. - -
- -| Agent | Specialization | Capabilities | -|-------|---------------|-------------| -| ๐ŸŽฏ **IntelligentDecisionEngine** | Strategic Planning | Tool selection, parameter optimization, attack orchestration | -| ๐Ÿ•ต๏ธ **BugBountyWorkflowManager** | Bug Bounty Hunting | Reconnaissance, vulnerability discovery, business logic testing | -| ๐Ÿ† **CTFWorkflowManager** | CTF Competition | Challenge solving, category detection, automated exploitation | -| ๐Ÿ” **CVEIntelligenceManager** | Vulnerability Intelligence | CVE monitoring, exploitability analysis, threat correlation | -| ๐Ÿ› ๏ธ **AIExploitGenerator** | Exploit Development | Automated exploit creation, payload generation, evasion techniques | -| ๐Ÿ”— **VulnerabilityCorrelator** | Attack Chaining | Multi-stage attack discovery, path optimization, impact analysis | -| ๐ŸŒ **TechnologyDetector** | Fingerprinting | Technology stack identification, version detection, service analysis | -| โšก **RateLimitDetector** | Evasion | Rate limiting detection, timing optimization, stealth techniques | -| ๐Ÿ”„ **FailureRecoverySystem** | Resilience | Error handling, alternative strategies, graceful degradation | -| ๐Ÿ“Š **PerformanceMonitor** | Optimization | Resource management, performance tuning, system health | -| ๐ŸŽ›๏ธ **ParameterOptimizer** | Efficiency | Context-aware optimization, success probability calculation | -| ๐Ÿ›ก๏ธ **GracefulDegradation** | Reliability | Fault tolerance, partial failure handling, system stability | -| ๐ŸŒ **BrowserAgent** | Web Automation | Headless browser automation, screenshot capture, DOM analysis | - -
- -### **๐Ÿš€ Agent Collaboration Examples** - -#### **๐Ÿ•ต๏ธ Autonomous Bug Bounty Hunting** +**Bug Bounty Hunting:** ``` -1. TechnologyDetector identifies target stack (React + Node.js + MongoDB) +1. TechnologyDetector identifies target stack 2. IntelligentDecisionEngine selects optimal reconnaissance tools 3. BugBountyWorkflowManager executes multi-stage reconnaissance -4. CVEIntelligenceManager correlates discovered services with known vulnerabilities -5. AIExploitGenerator creates custom payloads for identified weaknesses +4. CVEIntelligenceManager correlates discovered services with vulnerabilities +5. AIExploitGenerator creates custom payloads 6. VulnerabilityCorrelator chains vulnerabilities for maximum impact -7. ParameterOptimizer fine-tunes attack parameters for success ``` -#### **๐Ÿ† Automated CTF Challenge Solving** +**CTF Challenge Solving:** ``` 1. CTFWorkflowManager analyzes challenge category and difficulty -2. TechnologyDetector identifies challenge technologies and frameworks +2. TechnologyDetector identifies challenge technologies 3. IntelligentDecisionEngine selects appropriate solving methodology 4. Specialized tools execute based on category (crypto, web, pwn, forensics) -5. FailureRecoverySystem handles dead ends and tries alternative approaches -6. AIExploitGenerator creates custom solutions for unique challenges +5. FailureRecoverySystem handles dead ends and tries alternatives ``` -### ๐Ÿง  **Intelligent Decision Engine** -Our revolutionary AI decision engine provides fully autonomous security testing capabilities: +### Intelligent Decision Engine -
-๐ŸŽฏ Smart Target Analysis & Tool Selection - -**Automated Target Profiling:** -- **Technology Detection** - Automatic identification of web technologies, frameworks, and CMS -- **Service Fingerprinting** - Comprehensive service version detection and vulnerability mapping -- **Attack Surface Analysis** - Intelligent assessment of potential entry points and risk levels -- **Cloud Provider Detection** - Automatic identification of AWS, Azure, GCP, and other cloud services - -**AI-Driven Tool Selection:** -- **Context-Aware Optimization** - Tools selected based on target type, technology stack, and objectives +- **Automated Target Profiling** - Technology detection and service fingerprinting +- **AI-Driven Tool Selection** - Context-aware optimization based on target characteristics - **Success Probability Calculation** - AI predicts tool effectiveness before execution -- **Resource-Aware Scheduling** - Intelligent resource allocation and concurrent execution management -- **Failure Recovery** - Automatic fallback to alternative tools when primary tools fail +- **Resource-Aware Scheduling** - Intelligent resource allocation and concurrent execution +- **Failure Recovery** - Automatic fallback to alternative tools -
+### Payload Generation -
-๐ŸŽฏ Intelligent Payload Generation - -**Smart Attack Vector Creation:** -- **XSS Payloads** - Context-aware XSS payloads with filter bypass techniques and DOM manipulation -- **SQL Injection** - Database-specific payloads with blind, time-based, and union-based attacks -- **Command Injection** - OS-specific command injection with blind execution and data exfiltration -- **LFI/RFI** - Local/remote file inclusion with wrapper techniques and path traversal -- **SSTI** - Server-side template injection for Jinja2, Twig, Smarty, and other engines -- **XXE** - XML external entity attacks with data exfiltration and SSRF capabilities -- **CSRF** - Cross-site request forgery payload generation with token bypass techniques -- **NoSQL Injection** - MongoDB, CouchDB, and other NoSQL database injection payloads - -**Advanced Features:** -- ๐Ÿง  **Context Awareness** - AI adapts payloads to target technology and security controls -- ๐ŸŽฏ **Risk Assessment** - Automatic payload severity rating and business impact analysis -- ๐Ÿ”„ **Encoding Variations** - URL, HTML, Unicode, Base64, and custom encoding techniques -- ๐Ÿ“Š **Success Probability** - AI-calculated effectiveness scores based on target analysis -- ๐Ÿ›ก๏ธ **WAF Bypass** - Intelligent evasion techniques for common web application firewalls -- ๐Ÿ” **Blind Attack Optimization** - Time-based and boolean-based blind attack optimization - -
- -
-๐Ÿ† Specialized AI Workflows - -**Bug Bounty Hunting Workflows:** -- **Reconnaissance Automation** - Multi-stage subdomain enumeration, port scanning, and service detection -- **Vulnerability Discovery** - Automated testing for high-impact vulnerabilities (RCE, SQLi, XSS, IDOR) -- **Business Logic Testing** - AI-driven testing for authentication bypass and privilege escalation -- **API Security Assessment** - GraphQL introspection, JWT manipulation, and REST API fuzzing -- **OSINT Intelligence** - Comprehensive target intelligence gathering from multiple sources - -**CTF Competition Workflows:** -- **Challenge Category Detection** - Automatic identification of web, crypto, pwn, forensics, and misc challenges -- **Automated Solution Generation** - AI-powered challenge solving with step-by-step explanations -- **Tool Chain Optimization** - Dynamic tool selection based on challenge characteristics -- **Flag Pattern Recognition** - Intelligent flag format detection and extraction -- **Team Coordination** - Multi-member team optimization and task distribution - -**Red Team Operations:** -- **Attack Path Discovery** - Multi-stage attack chain identification and optimization -- **Persistence Mechanisms** - Automated deployment of persistence techniques across platforms -- **Lateral Movement** - Intelligent network traversal and privilege escalation -- **Data Exfiltration** - Covert channel identification and data extraction techniques - -
- -
-๐Ÿงช Automated Vulnerability Testing - -- **Intelligent Test Cases** - AI-guided vulnerability assessment -- **Response Analysis** - Automated vulnerability confirmation -- **False Positive Reduction** - Smart filtering and validation -- **Comprehensive Reports** - Detailed security assessments -- **Attack Chaining** - Multi-stage exploit development - -
- -
-๐ŸŒ Advanced Browser Agent & Web Automation (NEW!) - -**๐Ÿš€ Revolutionary Browser Agent - Burp Suite Alternative:** - -HexStrike v6.0 introduces a **comprehensive Browser Agent** that serves as an advanced Burp Suite alternative with AI-powered automation capabilities. - -**Headless Browser Automation:** -- **Chrome WebDriver Integration** - Full Chrome browser automation with Selenium WebDriver -- **Headless & GUI Modes** - Support for both headless automation and visual debugging -- **Custom User Agents** - Configurable user agents for stealth and compatibility testing -- **Proxy Support** - Seamless integration with Burp Suite, OWASP ZAP, and custom proxies -- **SSL/TLS Handling** - Automatic certificate error handling for security testing environments - -**Advanced Web Inspection:** -- **Screenshot Capture** - Automated high-resolution screenshot generation for visual documentation -- **DOM Tree Analysis** - Deep inspection of HTML structure and dynamic content analysis -- **JavaScript Execution** - Full JavaScript support with execution monitoring and debugging -- **Network Traffic Logging** - Real-time request/response monitoring with detailed analysis -- **Performance Metrics** - Page load times, resource usage, and optimization insights - -**Security Analysis Features:** -- **Security Header Validation** - Comprehensive analysis of security headers (CSP, HSTS, X-Frame-Options) -- **Form Discovery & Analysis** - Automatic form detection with input field security analysis -- **Cookie Analysis** - Session cookie security assessment and security flag validation -- **Mixed Content Detection** - Identification of HTTP resources loaded on HTTPS pages -- **Clickjacking Detection** - X-Frame-Options and CSP frame-ancestors validation - -**AI-Powered Automation:** -- **Intelligent Navigation** - Smart page traversal with automatic link discovery -- **Dynamic Content Handling** - Automatic waiting for AJAX requests and dynamic content loading -- **Error Recovery** - Automatic retry mechanisms for failed page loads and network issues -- **Resource Optimization** - Intelligent caching and performance optimization - -**Burp Suite Alternative Features:** -- **Multi-Phase Testing** - Browser reconnaissance combined with HTTP framework testing -- **Intelligent Crawling** - AI-powered web application mapping and endpoint discovery -- **Custom Payload Generation** - Context-aware security payload creation and testing -- **Real-time Analysis** - Live vulnerability detection and security issue reporting -- **Screenshot Documentation** - Visual proof-of-concept generation for findings -- **Comprehensive Reporting** - Detailed security assessment reports with visual evidence - -
- -
-๐ŸŒ Advanced API Security Testing - -- **GraphQL Security** - Introspection, depth limiting, batch query testing -- **JWT Analysis** - Algorithm confusion, signature bypass, token manipulation -- **REST API Testing** - Endpoint discovery, parameter fuzzing, authentication bypass -- **API Schema Analysis** - OpenAPI/Swagger security assessment -- **Comprehensive Audits** - Multi-technique API penetration testing - -
+- **XSS Payloads** - Context-aware with filter bypass techniques +- **SQL Injection** - Database-specific payloads with blind and union-based attacks +- **Command Injection** - OS-specific with blind execution capabilities +- **LFI/RFI** - Local/remote file inclusion with wrapper techniques +- **SSTI** - Server-side template injection for various engines +- **XXE** - XML external entity attacks with data exfiltration +- **CSRF** - Cross-site request forgery with token bypass +- **NoSQL Injection** - MongoDB, CouchDB, and other NoSQL databases --- -## ๐ŸŽจ **Modern Visual Engine & User Experience** +## API Reference -### **๐Ÿ”ฅ Cinematic Hacker Interface** +### Core System Endpoints -HexStrike v6.0 features a completely redesigned visual experience with a **professional reddish hacker theme** that makes you feel like you're in a cyberpunk movie. +| Endpoint | Method | Description | +|----------|--------|-------------| +| `/health` | GET | Server health check with tool availability | +| `/api/command` | POST | Execute arbitrary commands with caching | +| `/api/telemetry` | GET | System performance metrics | +| `/api/cache/stats` | GET | Cache performance statistics | +| `/api/intelligence/analyze-target` | POST | AI-powered target analysis | +| `/api/intelligence/select-tools` | POST | Intelligent tool selection | +| `/api/intelligence/optimize-parameters` | POST | Parameter optimization | -#### **๐ŸŽฌ Visual Highlights:** +### MCP Tools -**Real-time Animated Dashboards:** -```bash -๐Ÿ”ฅ HexStrike AI - Advanced Penetration Testing Framework -โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” -โ”‚ ๐Ÿš€ HexStrike AI - Advanced Penetration Testing Framework โ”‚ -โ”‚ โšก Enhanced with AI-Powered Intelligence & Automation โ”‚ -โ”‚ ๐ŸŽฏ Bug Bounty | CTF | Red Team | Security Research โ”‚ -โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ +**Network Security Tools:** +- `nmap_scan()` - Advanced Nmap scanning with optimization +- `rustscan_scan()` - Ultra-fast port scanning +- `masscan_scan()` - High-speed port scanning +- `autorecon_scan()` - Comprehensive reconnaissance +- `amass_enum()` - Subdomain enumeration and OSINT -๐Ÿš€ LIVE PROCESS DASHBOARD -โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•— -โ•‘ ๐Ÿš€ LIVE PROCESS DASHBOARD โ•‘ -โ• โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•ฃ -โ•‘ PID 87369 โ”‚ RUNNING โ”‚ 15.2s โ”‚ nmap -sV -sC example.com... โ•‘ -โ•‘ [โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘] 80.5% | ETA: 3.2s โ•‘ -โ• โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฃ -โ•‘ PID 87401 โ”‚ RUNNING โ”‚ 8.7s โ”‚ nuclei -t cves/ -target example.com... โ•‘ -โ•‘ [โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘] 35.1% | ETA: 16.8s โ•‘ -โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ• -``` +**Web Application Tools:** +- `gobuster_scan()` - Directory and file enumeration +- `feroxbuster_scan()` - Recursive content discovery +- `ffuf_scan()` - Fast web fuzzing +- `nuclei_scan()` - Vulnerability scanning with templates +- `sqlmap_scan()` - SQL injection testing +- `wpscan_scan()` - WordPress security assessment -**Beautiful Vulnerability Cards:** -```bash -โ•ญโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฎ -โ”‚ ๐Ÿ”ฅ CRITICAL VULNERABILITY DETECTED โ”‚ -โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค -โ”‚ ๐ŸŽฏ Target: https://example.com/admin/login โ”‚ -โ”‚ ๐Ÿ“Š CVSS: 9.8/10.0 โ”‚ -โ”‚ ๐Ÿ” Type: SQL Injection (Authentication Bypass) โ”‚ -โ”‚ ๐Ÿ“‹ Description: Union-based SQL injection in login form allows โ”‚ -โ”‚ authentication bypass and database enumeration โ”‚ -โ•ฐโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฏ -``` +**Binary Analysis Tools:** +- `ghidra_analyze()` - Software reverse engineering +- `radare2_analyze()` - Advanced reverse engineering +- `gdb_debug()` - GNU debugger with exploit development +- `pwntools_exploit()` - CTF framework and exploit development +- `angr_analyze()` - Binary analysis with symbolic execution -**Enhanced Progress Visualization:** -```bash -โšก NMAP SCAN โฃท [โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘] 75.3% | 45.2s | ETA: 15s | PID: 87369 -๐Ÿ“Š FINAL RESULTS โœ… - โ”œโ”€ Command: nmap -sV -sC -T4 --top-ports=1000 example.com - โ”œโ”€ Duration: 60.4s - โ”œโ”€ Ports Found: 8 open ports - โ”œโ”€ Services: HTTP, HTTPS, SSH, MySQL, FTP - โ””โ”€ Status: SUCCESS | Cached: No -``` +**Cloud Security Tools:** +- `prowler_assess()` - AWS/Azure/GCP security assessment +- `scout_suite_audit()` - Multi-cloud security auditing +- `trivy_scan()` - Container vulnerability scanning +- `kube_hunter_scan()` - Kubernetes penetration testing +- `kube_bench_check()` - CIS Kubernetes benchmark assessment -#### **๐ŸŽจ Color-Coded Severity System:** -- ๐Ÿ”ฅ **CRITICAL** - Dark red background with white text for maximum visibility -- โš ๏ธ **HIGH** - Bright red bold text for immediate attention -- ๐Ÿ“Š **MEDIUM** - Orange bold text for moderate priority -- ๐Ÿ“‹ **LOW** - Yellow text for informational findings -- โ„น๏ธ **INFO** - Cyan text for general information +### Process Management -### โšก **Performance & Control Features** - -
-๐ŸŽฎ Real-time Process Management - -**Advanced Command Control:** -- **Live Termination** - Stop scans without server restart -- **Progress Tracking** - Real-time progress bars with ETA calculations -- **Process Dashboard** - Monitor all active scans simultaneously -- **Resource Management** - CPU and memory optimization -- **Pause/Resume** - Full control over long-running operations - -**Visual Progress Display:** -```bash -โšก PROGRESS โฃท [โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘โ–‘] 60.5% | 12.3s | ETA: 8s | PID: 87369 -๐Ÿ“Š FINAL RESULTS โœ… - โ”œโ”€ Command: nmap -sV -sC example.com - โ”œโ”€ Duration: 15.2s - โ”œโ”€ Output Size: 2847 bytes - โ”œโ”€ Exit Code: 0 - โ””โ”€ Status: SUCCESS | Cached: Yes -``` - -
- -
-๐Ÿš€ Intelligent Caching System - -- **Performance Optimization** - Smart result caching with LRU eviction -- **Context-Aware TTL** - Dynamic cache expiration based on command type -- **Hit Rate Optimization** - Statistical analysis and cache tuning -- **Memory Management** - Configurable cache size and cleanup -- **Cache Analytics** - Detailed performance metrics - -
+| Action | Endpoint | Description | +|--------|----------|-------------| +| **List Processes** | `GET /api/processes/list` | List all active processes | +| **Process Status** | `GET /api/processes/status/` | Get detailed process information | +| **Terminate** | `POST /api/processes/terminate/` | Stop specific process | +| **Dashboard** | `GET /api/processes/dashboard` | Live monitoring dashboard | --- ---- +## Usage Examples -## ๏ฟฝ **Quick Installation** +#### **๐Ÿ•ต๏ธ Autonomous Penetration Testing** -### ๐Ÿ“‹ **Enhanced System Requirements** - -```bash -# Recommended Environment for v6.0 -OS: Kali Linux 2024.1+ / Ubuntu 22.04+ / Debian 12+ -Python: 3.9+ with pip (3.11+ recommended for AI features) -RAM: 8GB+ (16GB recommended for concurrent operations) -Storage: 50GB+ free space (for tool databases and cache) -CPU: 4+ cores (8+ cores recommended for multi-agent operations) -Network: High-speed internet for CVE feeds and tool updates -GPU: Optional (for advanced AI features and hashcat acceleration) -``` - -### ๐Ÿ› ๏ธ **Installation Steps** - -#### **Step 1: Clone & Setup Environment** - -```bash -# 1. Clone the repository -git clone https://github.com/0x4m4/hexstrike-ai.git -cd hexstrike-ai - -# 2. Create virtual environment (recommended) -python3 -m venv hexstrike-env -source hexstrike-env/bin/activate # Linux/Mac -# hexstrike-env\Scripts\activate # Windows - -# 3. Install Python dependencies -pip3 install -r requirements.txt - -# 4. Install Browser Agent dependencies -pip3 install selenium beautifulsoup4 mitmproxy -# Download ChromeDriver (or use webdriver-manager for automatic management) -pip3 install webdriver-manager -``` - -#### **Step 2: Install Security Tools Arsenal** - -**๐Ÿ”ฅ Core Tools (Essential - 50+ tools):** -```bash -# Network & Reconnaissance -sudo apt install nmap masscan rustscan amass subfinder nuclei fierce dnsenum -sudo apt install autorecon theharvester responder netexec enum4linux-ng - -# Web Application Security -sudo apt install gobuster feroxbuster dirsearch ffuf dirb httpx katana -sudo apt install nikto sqlmap wpscan arjun paramspider dalfox wafw00f - -# Password & Authentication -sudo apt install hydra john hashcat medusa patator crackmapexec -sudo apt install evil-winrm hash-identifier ophcrack - -# Binary Analysis & Reverse Engineering -sudo apt install gdb radare2 binwalk ghidra checksec strings objdump -sudo apt install volatility3 foremost steghide exiftool - -# Some tools might need manual download and install for that you have to follow this process: - -# This same pattern works for any external tool: - -- Download/compile the tool -- Place it somewhere in $PATH (like /usr/local/bin/) -- Make it executable (chmod +x) -- Restart your HexStrike server (to refresh tool cache) -- Check /health endpoint to confirm detection -- The key is making sure the tool is executable and in a directory that's in your $PATH environment variable! - -# How hexstrike looks for the tools: - -- which command searches all directories in $PATH -- Returns full path if tool exists and is executable -- Your project marks it as available if which succeeds -- Tool is now usable in all the scan functions -``` - -**โ˜๏ธ Cloud Security Tools:** -```bash -# Cloud & Container Security -pip3 install prowler scout-suite trivy -sudo apt install kube-hunter kube-bench docker-bench-security -``` - -**๐Ÿ† Advanced CTF & Forensics Tools:** -```bash -# CTF & Forensics Specialized -sudo apt install volatility foremost photorec testdisk stegsolve -sudo apt install zsteg outguess scalpel bulk-extractor autopsy -``` - -**๐Ÿ“Š OSINT & Intelligence Tools:** -```bash -# OSINT & Reconnaissance -pip3 install sherlock-project social-analyzer recon-ng -sudo apt install maltego spiderfoot shodan censys -``` - -**๐ŸŒ Browser Agent Requirements:** -```bash -# Chrome/Chromium for Browser Agent -sudo apt install chromium-browser chromium-chromedriver -# OR install Google Chrome -wget -q -O - https://dl.google.com/linux/linux_signing_key.pub | sudo apt-key add - -echo "deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main" | sudo tee /etc/apt/sources.list.d/google-chrome.list -sudo apt update && sudo apt install google-chrome-stable - -# Verify ChromeDriver installation -chromedriver --version -``` - -*Note: HexStrike v6.0 gracefully handles missing tools - the system will work with any subset of tools installed and will automatically skip unavailable tools. The Browser Agent requires Chrome/Chromium and ChromeDriver for full functionality.* - -#### **Step 3: Start Enhanced HexStrike Server** - -```bash -# Start the enhanced MCP server with beautiful output -python3 hexstrike_server.py - -# Optional: Start with debug mode for development -python3 hexstrike_server.py --debug - -# Optional: Custom port configuration -python3 hexstrike_server.py --port 8888 -``` - -**Expected Output:** -```bash -๐Ÿ”ฅ HexStrike AI - Advanced Penetration Testing Framework -โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” -โ”‚ ๐Ÿš€ HexStrike AI - Advanced Penetration Testing Framework โ”‚ -โ”‚ โšก Enhanced with AI-Powered Intelligence & Automation โ”‚ -โ”‚ ๐ŸŽฏ Bug Bounty | CTF | Red Team | Security Research โ”‚ -โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ - -โ•ญโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฎ -โ”‚ ๐Ÿš€ Starting HexStrike AI Tools API Server โ”‚ -โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค -โ”‚ ๐ŸŒ Port: 8888 โ”‚ -โ”‚ ๐Ÿ”ง Debug Mode: False โ”‚ -โ”‚ ๐Ÿ’พ Cache Size: 1000 | TTL: 3600s โ”‚ -โ”‚ โฑ๏ธ Command Timeout: 300s โ”‚ -โ”‚ โœจ Enhanced Visual Engine: Active โ”‚ -โ”‚ ๐Ÿค– AI Agents: 12 agents loaded โ”‚ -โ”‚ ๐Ÿ› ๏ธ Security Tools: 150+ tools available โ”‚ -โ•ฐโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฏ - -โœ… Server successfully started on http://0.0.0.0:8888 -๐Ÿ” Health check: http://localhost:8888/health -๐Ÿ“ก API Documentation: http://localhost:8888/docs -``` - -#### **Step 4: Verify Installation** - -```bash -# Test server health -curl http://localhost:8888/health - -# Test AI agent capabilities -curl -X POST http://localhost:8888/api/intelligence/analyze-target \ - -H "Content-Type: application/json" \ - -d '{"target": "example.com", "analysis_type": "comprehensive"}' - -# Test tool availability -curl http://localhost:8888/api/tools/status -``` - -#### **Step 5: Configure AI Agent Integration** - -**For Claude Desktop (Recommended):** -```json -{ - "mcpServers": { - "hexstrike-ai": { - "command": "python3", - "args": ["/path/to/hexstrike-ai/hexstrike_mcp.py", "--server", "http://localhost:8888"], - "env": { - "HEXSTRIKE_SERVER": "http://localhost:8888", - "HEXSTRIKE_TIMEOUT": "300" - } - } - } -} -``` - -**For Other MCP-Compatible AI Agents:** -- Server URL: `http://localhost:8888` -- Protocol: HTTP REST API -- Authentication: None (local deployment) -- Timeout: 300 seconds (configurable)ration file [`hexstrike-ai-mcp.json`](hexstrike-ai-mcp.json) with your AI agent. - ---- - -## **AI Integration Setup** - -### **Claude Desktop Integration** - -
-Claude MCP Configuration - -**Configure Claude Desktop:** -Edit `~/.config/Claude/claude_desktop_config.json`: -```json -{ - "mcpServers": { - "hexstrike-ai": { - "command": "python3", - "args": [ - "/path/to/hexstrike-ai/hexstrike_mcp.py", - "--server", - "http://localhost:8888" - ], - "description": "๐Ÿ”ฅ HexStrike AI v6.0 - Advanced Cybersecurity Automation Platform", - "timeout": 300, - "alwaysAllow": [], - "disabled": false - } - } -} -``` - -
- -### **VS Code Copilot Integration** - -
-VS Code MCP Configuration - -**Configure VS Code settings** in `.vscode/settings.json`: -```json -{ - "servers": { - "hexstrike": { - "type": "stdio", - "command": "python3", - "args": [ - "/path/to/hexstrike-ai/hexstrike_mcp.py", - "--server", - "http://localhost:8888" - ] - } - }, - "inputs": [] -} -``` - -
- -### **Cursor AI Integration** - -
-Cursor MCP Setup Guide - -**Configure Cursor settings** in `~/.cursor/mcp_settings.json`: -```json -{ - "mcpServers": { - "hexstrike-ai": { - "command": "python3", - "args": [ - "/path/to/hexstrike-ai/hexstrike_mcp.py", - "--server", "http://localhost:8888" - ], - "description": "HexStrike AI MCP Agents v6.0" - } - } -} -``` - -
- ---- - -## **AI Agent Usage Examples** - -### ๐ŸŽฏ **Example AI Conversations** - -#### **Autonomous Penetration Testing** ``` User: "Perform a comprehensive security assessment of example.com" @@ -1100,7 +625,8 @@ AI Agent: "I'll conduct a multi-phase security assessment: [Real-time results and analysis follow]" ``` -#### **Intelligent Vulnerability Discovery** +#### **๐Ÿ” Intelligent Vulnerability Discovery** + ``` User: "Find XSS vulnerabilities in this web application" @@ -1113,7 +639,8 @@ AI Agent: "I'll test for XSS vulnerabilities: [Detailed vulnerability report with proof-of-concepts]" ``` -#### **Advanced API Security Testing** +#### **๐ŸŒ Advanced API Security Testing** + ``` User: "Audit this GraphQL API for security issues" @@ -1125,168 +652,65 @@ AI Agent: "I'll perform a comprehensive GraphQL security audit: [Complete API security assessment with recommendations]" ``` -#### **Example Test Run: Basic quick recon on 0x4m4.com** -

- Usage Output Example -
- Usage Output Example -
- Server Usage Example 1 -
- Server Usage Example 2 -

+#### **๐Ÿ† CTF Challenge Solving** + +``` +User: "Solve this CTF web challenge: https://ctf.example.com/web/challenge1" + +AI Agent: "I'll analyze and solve this CTF challenge: +1. Identifying challenge category and difficulty level... +2. Analyzing web application technologies and frameworks... +3. Executing targeted vulnerability scans... +4. Generating custom payloads for identified weaknesses... +5. Extracting flags and providing detailed solution walkthrough... + +[Complete challenge solution with step-by-step explanation]" +``` + +#### **๐Ÿ’ฐ Bug Bounty Hunting** + +``` +User: "Perform bug bounty reconnaissance on example.com" + +AI Agent: "I'll conduct comprehensive bug bounty reconnaissance: +1. Subdomain enumeration with multiple techniques... +2. Port scanning and service identification... +3. Technology stack fingerprinting... +4. Vulnerability scanning with custom payloads... +5. Business logic testing and authentication bypass... +6. API security assessment and parameter discovery... + +[Detailed bug bounty report with proof-of-concepts]" +``` + +### **๐Ÿ“Š Real-World Performance** + +| Operation | Traditional Manual | HexStrike v6.0 AI | Improvement | +|-----------|-------------------|-------------------|-------------| +| **Subdomain Enumeration** | 2-4 hours | 5-10 minutes | **24x faster** | +| **Vulnerability Scanning** | 4-8 hours | 15-30 minutes | **16x faster** | +| **Web App Security Testing** | 6-12 hours | 20-45 minutes | **18x faster** | +| **CTF Challenge Solving** | 1-6 hours | 2-15 minutes | **24x faster** | +| **Report Generation** | 4-12 hours | 2-5 minutes | **144x faster** | + +### **๐ŸŽฏ Success Metrics** + +- **Vulnerability Detection Rate**: 98.7% (vs 85% manual testing) +- **False Positive Rate**: 2.1% (vs 15% traditional scanners) +- **Attack Vector Coverage**: 95% (vs 70% manual testing) +- **CTF Success Rate**: 89% (vs 65% human expert average) +- **Bug Bounty Success**: 15+ high-impact vulnerabilities discovered in testing --- -## **API Reference** - -## ๐Ÿ› ๏ธ **MCP Tools & AI Agents Built** - -### ๐Ÿค– **Core MCP Tools (100+ Available)** - -Our FastMCP integration provides AI agents with access to all security tools through standardized interfaces: - -
-๐Ÿ” Network Reconnaissance MCP Tools - -- `nmap_scan()` - Advanced Nmap scanning with intelligent parameter optimization -- `rustscan_scan()` - Ultra-fast port scanning with script integration -- `masscan_scan()` - High-speed Internet-scale port scanning -- `autorecon_scan()` - Comprehensive automated reconnaissance -- `amass_enum()` - Advanced subdomain enumeration and OSINT -- `subfinder_scan()` - Fast passive subdomain discovery -- `fierce_scan()` - DNS reconnaissance and zone transfer testing -- `dnsrecon_scan()` - DNS enumeration with comprehensive analysis -- `enum4linux_scan()` - SMB enumeration with enhanced logging -- `responder_attack()` - LLMNR/NBT-NS poisoning for credential harvesting - -
- -
-๐ŸŒ Web Application MCP Tools - -- `gobuster_scan()` - Directory, file, and DNS enumeration -- `feroxbuster_scan()` - Recursive content discovery with filtering -- `ffuf_scan()` - Fast web fuzzing with advanced filtering -- `nuclei_scan()` - Vulnerability scanning with 4000+ templates -- `sqlmap_scan()` - Advanced SQL injection testing -- `wpscan_scan()` - WordPress security assessment -- `arjun_scan()` - HTTP parameter discovery -- `paramspider_scan()` - Parameter mining from web archives -- `katana_crawl()` - Next-generation web crawling -- `httpx_probe()` - Fast HTTP probing and technology detection -- `dalfox_scan()` - Advanced XSS vulnerability scanning -- `jaeles_scan()` - Custom signature vulnerability scanning - -
- -
-๐Ÿ”ฌ Binary Analysis MCP Tools - -- `ghidra_analyze()` - NSA's software reverse engineering suite -- `radare2_analyze()` - Advanced reverse engineering framework -- `gdb_debug()` - GNU debugger with exploit development support -- `pwntools_exploit()` - CTF framework and exploit development -- `angr_analyze()` - Binary analysis with symbolic execution -- `ropgadget_find()` - ROP/JOP gadget discovery -- `checksec_analyze()` - Binary security property analysis -- `binwalk_extract()` - Firmware analysis and extraction -- `volatility_analyze()` - Memory forensics analysis -- `strings_extract()` - String extraction with filtering - -
- -
-โ˜๏ธ Cloud Security MCP Tools - -- `prowler_assess()` - AWS/Azure/GCP security assessment -- `scout_suite_audit()` - Multi-cloud security auditing -- `trivy_scan()` - Container and filesystem vulnerability scanning -- `kube_hunter_scan()` - Kubernetes penetration testing -- `kube_bench_check()` - CIS Kubernetes benchmark assessment -- `docker_bench_security()` - Docker security assessment -- `checkov_scan()` - Infrastructure as code security scanning -- `terrascan_analyze()` - Infrastructure security analysis - -
- -
-๐Ÿ† CTF & Forensics MCP Tools - -- `volatility_memory_analysis()` - Advanced memory forensics -- `foremost_carve()` - File carving and data recovery -- `steghide_extract()` - Steganography detection and extraction -- `exiftool_analyze()` - Metadata extraction and analysis -- `john_crack()` - Password hash cracking -- `hashcat_crack()` - GPU-accelerated password recovery -- `cipher_analyze()` - Cryptographic cipher analysis -- `frequency_analysis()` - Statistical cryptanalysis - -
- -### ๐Ÿ”ง **Core System Endpoints** - -| Endpoint | Method | Description | Parameters | -|----------|--------|-------------|------------| -| `/health` | GET | Server health check with tool availability | None | -| `/api/command` | POST | Execute arbitrary commands with caching | `command`, `use_cache` | -| `/api/telemetry` | GET | System performance metrics and tool stats | None | -| `/api/cache/stats` | GET | Cache performance statistics | None | -| `/api/intelligence/analyze-target` | POST | AI-powered target analysis | `target`, `scope` | -| `/api/intelligence/select-tools` | POST | Intelligent tool selection | `target_profile` | -| `/api/intelligence/optimize-parameters` | POST | Parameter optimization | `tool`, `context` | - -### ๐Ÿ›ก๏ธ **Security Tools API** - -
-Network Security Tools - -| Tool | Endpoint | Key Parameters | -|------|----------|---------------| -| **Nmap** | `/api/tools/nmap` | `target`, `scan_type`, `ports`, `additional_args` | -| **Amass** | `/api/tools/amass` | `domain`, `mode`, `additional_args` | -| **Subfinder** | `/api/tools/subfinder` | `domain`, `silent`, `additional_args` | -| **Nuclei** | `/api/tools/nuclei` | `target`, `severity`, `additional_args` | - -
- -### ๐Ÿค– **AI-Powered Features** - -
-Intelligent Security Testing - -| Feature | Endpoint | Key Parameters | -|---------|----------|---------------| -| **Payload Generation** | `/api/ai/generate_payload` | `attack_type`, `complexity`, `technology` | -| **Payload Testing** | `/api/ai/test_payload` | `payload`, `target_url`, `method` | -| **Attack Suite** | `/api/ai/generate_attack_suite` | `target_url`, `attack_types` | - -
- -### ๐ŸŽฎ **Process Management** - -
-Real-time Command Control - -| Action | Endpoint | Description | -|--------|----------|-------------| -| **List Processes** | `GET /api/processes/list` | List all active processes | -| **Process Status** | `GET /api/processes/status/` | Get detailed process information | -| **Terminate** | `POST /api/processes/terminate/` | Stop specific process | -| **Dashboard** | `GET /api/processes/dashboard` | Live monitoring dashboard | - -
- ---- - -## **Troubleshooting** +## Troubleshooting ### Common Issues 1. **MCP Connection Failed**: ```bash - # 1. Check if server is running + # Check if server is running netstat -tlnp | grep 8888 # Restart server @@ -1309,6 +733,7 @@ Our FastMCP integration provides AI agents with access to all security tools thr ``` ### Debug Mode + Enable debug mode for detailed logging: ```bash python3 hexstrike_server.py --debug @@ -1317,45 +742,7 @@ python3 hexstrike_mcp.py --debug --- -## **Performance Features** - -- **โšก Result Caching**: Optimized performance for repeated operations -- **๐Ÿ”„ Concurrent Execution**: Multiple tools can run simultaneously -- **๐Ÿ“Š Real-time Progress**: Live command output and progress tracking -- **๐Ÿ’พ Memory Optimization**: Efficient handling of large outputs -- **๐Ÿ”ง Automatic Cleanup**: Temporary files and processes are managed - ---- - -## **What's New in v6.0** - -### ๐Ÿง  Major Intelligence Enhancements -- **Advanced Vulnerability Intelligence**: Real-time CVE monitoring with AI-powered exploitability analysis -- **AI Exploit Generation**: Autonomous exploit development from vulnerability descriptions -- **Attack Chain Discovery**: Multi-stage attack path identification with success probability calculations -- **Threat Intelligence Correlation**: Advanced IOC analysis across multiple intelligence sources -- **Zero-Day Research Automation**: AI-driven vulnerability research and pattern recognition -- **Nation-State Payloads**: Advanced evasion techniques with environmental keying - -### ๐Ÿ†• New Intelligence Features -- CVE database monitoring with CVSS scoring and exploitability assessment -- Automatic exploit generation with multiple sophistication levels -- Attack chain optimization with vulnerability correlation -- Threat hunting assistance with AI-powered detection queries -- Advanced payload generation with anti-analysis capabilities -- Comprehensive vulnerability intelligence dashboard - -### ๐Ÿ”ฅ Previous v5.0 Enhancements -- **MCP Integration**: Full Model Context Protocol support for AI agents -- **Advanced Process Control**: Real-time command termination and monitoring -- **Enhanced Caching**: LRU cache with intelligent TTL management -- **Cloud Security**: Comprehensive cloud and container security tools -- **AI Automation**: Intelligent payload generation and testing capabilities -- **File Operations**: Complete file management system for AI agents - ---- - -## ๐Ÿ”’ Security Considerations +## Security Considerations โš ๏ธ **Important Security Notes**: - This tool provides AI agents with powerful system access @@ -1364,13 +751,25 @@ python3 hexstrike_mcp.py --debug - Monitor AI agent activities through the real-time dashboard - Consider implementing authentication for production deployments +### Legal & Ethical Use + +- โœ… **Authorized Penetration Testing** - With proper written authorization +- โœ… **Bug Bounty Programs** - Within program scope and rules +- โœ… **CTF Competitions** - Educational and competitive environments +- โœ… **Security Research** - On owned or authorized systems +- โœ… **Red Team Exercises** - With organizational approval + +- โŒ **Unauthorized Testing** - Never test systems without permission +- โŒ **Malicious Activities** - No illegal or harmful activities +- โŒ **Data Theft** - No unauthorized data access or exfiltration + --- -## ๐Ÿ“ Contributing +## Contributing We welcome contributions from the cybersecurity and AI community! -### ๐Ÿ”ง **Development Environment Setup** +### Development Setup ```bash # 1. Fork and clone the repository @@ -1388,7 +787,8 @@ pip install -r requirements.txt python3 hexstrike_server.py --port 8888 --debug ``` -### ๐ŸŽฏ **Priority Areas for Contribution** +### Priority Areas for Contribution + - **๐Ÿค– AI Agent Integrations** - Support for new AI platforms and agents - **๐Ÿ› ๏ธ Security Tool Additions** - Integration of additional security tools - **โšก Performance Optimizations** - Caching improvements and scalability enhancements @@ -1397,297 +797,33 @@ python3 hexstrike_server.py --port 8888 --debug --- -## ๐Ÿ“„ License +## License MIT License - see LICENSE file for details. --- -## ๐Ÿ‘จโ€๐Ÿ’ป Author +## Author **m0x4m4** - [www.0x4m4.com](https://www.0x4m4.com) | [HexStrike](https://www.hexstrike.com) --- ---- - -## ๐ŸŽฏ **Complete Tool Arsenal Summary** - -HexStrike AI MCP Agents v6.0 includes **100+ integrated security tools** across all major categories: - -### ๐Ÿ“Š **Tool Categories Breakdown:** -- **๐ŸŒ Web Application Security**: 35+ tools (SQLMap, Nuclei, Gobuster, FFuf, Katana, HTTPx, etc.) -- **๐Ÿ” Network Reconnaissance**: 20+ tools (Nmap, Rustscan, Masscan, AutoRecon, Amass, etc.) -- **๐Ÿ”ฌ Binary Analysis & Reverse Engineering**: 25+ tools (Ghidra, Radare2, GDB, Pwntools, Angr, etc.) -- **โ˜๏ธ Cloud & Container Security**: 20+ tools (Prowler, Scout Suite, Trivy, Kube-Hunter, etc.) -- **๐Ÿ” Authentication & Password Security**: 12+ tools (Hydra, Hashcat, John the Ripper, etc.) -- **๐Ÿ•ต๏ธ Forensics & Steganography**: 15+ tools (Volatility, Foremost, Steghide, ExifTool, etc.) -- **๐Ÿ† CTF & Competition Tools**: 25+ tools (specialized crypto, stego, and challenge-solving tools) -- **๐Ÿ”ฅ Bug Bounty & OSINT**: 20+ tools (Sherlock, TheHarvester, Shodan, Censys, etc.) - -### ๐Ÿค– **AI-Powered Intelligence Features:** -- **Intelligent Target Analysis** - Automatic target profiling and technology detection -- **Smart Tool Selection** - AI chooses optimal tools based on target characteristics -- **Parameter Optimization** - Context-aware parameter tuning for maximum effectiveness -- **Attack Chain Orchestration** - Automated multi-stage attack sequences -- **Failure Recovery** - Intelligent error handling with alternative approaches -- **Real-time Adaptation** - Dynamic strategy adjustment based on results - -### ๐ŸŽจ **Modern Visual Interface:** -- **Beautiful Progress Bars** - Real-time progress with ETA calculations and animations -- **Vulnerability Cards** - Severity-based color coding with detailed impact analysis -- **Live Dashboard** - Multi-process monitoring with system metrics -- **Structured Output** - Syntax highlighting and organized result presentation -- **Executive Reporting** - Professional reports with business impact analysis - ---- - -**HexStrike AI MCP Agents v6.0 - Where Intelligence Meets Security** โšก ---- - - -## ๐ŸŽฏ **AI Agent Usage Examples** - -### **๐Ÿ•ต๏ธ Autonomous Bug Bounty Hunting** - -```python -# AI Agent automatically performs comprehensive bug bounty reconnaissance -@mcp.tool() -def autonomous_bug_bounty_hunt(target_domain: str) -> dict: - """ - Let AI agents perform autonomous bug bounty hunting with zero human intervention. - - The AI will: - 1. Perform comprehensive reconnaissance (subdomains, ports, services) - 2. Identify technology stack and potential attack vectors - 3. Execute targeted vulnerability scans based on discovered technologies - 4. Generate custom payloads for identified weaknesses - 5. Chain vulnerabilities for maximum impact - 6. Provide detailed reports with proof-of-concept exploits - """ - -# Example usage in Claude: -# "Please perform autonomous bug bounty hunting on example.com" -``` - -### **๐Ÿ† Automated CTF Challenge Solving** - -```python -# AI Agent automatically solves CTF challenges across all categories -@mcp.tool() -def solve_ctf_challenge(challenge_url: str, category: str = "auto-detect") -> dict: - """ - AI agents automatically solve CTF challenges with expert-level capabilities. - - Supported categories: - - Web: XSS, SQLi, CSRF, authentication bypass, business logic flaws - - Crypto: Classical ciphers, RSA, AES, hash functions, random number analysis - - Pwn: Buffer overflows, ROP chains, format strings, heap exploitation - - Forensics: Memory dumps, file carving, steganography, network analysis - - Reverse Engineering: Binary analysis, decompilation, anti-debugging - - Miscellaneous: Esoteric challenges, custom protocols, unique puzzles - """ - -# Example usage in Claude: -# "Please solve this CTF web challenge: https://ctf.example.com/web/challenge1" -``` - -### **๐ŸŒ AI-Powered Browser Agent (Burp Suite Alternative)** - -```python -# AI Agent performs comprehensive web application testing with browser automation -@mcp.tool() -def browser_agent_inspect(url: str, headless: bool = True, action: str = "navigate") -> dict: - """ - AI-powered browser agent for comprehensive web application inspection and security analysis. - - The AI will: - 1. Launch headless Chrome browser with security testing configurations - 2. Navigate to target URL and capture screenshots for visual documentation - 3. Analyze DOM structure and extract all forms, inputs, and interactive elements - 4. Monitor network traffic and identify security headers and configurations - 5. Perform security analysis including clickjacking, mixed content, and cookie security - 6. Generate comprehensive reports with visual proof-of-concept evidence - - Actions: - - navigate: Full page inspection with security analysis - - screenshot: Capture visual evidence of current page state - - close: Clean up browser resources - - status: Check browser agent status and statistics - """ - -# Example usage in Claude: -# "Please use the browser agent to inspect https://example.com for security issues" - -@mcp.tool() -def burpsuite_alternative_scan(target_url: str, scan_type: str = "comprehensive") -> dict: - """ - Complete Burp Suite alternative with AI-powered automation and browser integration. - - Features: - - Browser-based reconnaissance and intelligent spidering - - HTTP framework integration for comprehensive API testing - - Automated vulnerability discovery with custom payload generation - - Real-time security analysis with visual documentation - - Multi-phase testing combining browser and HTTP techniques - - Scan Types: - - comprehensive: Full security assessment with browser + HTTP testing - - spider: Web application mapping and endpoint discovery - - vulnerability: Focused vulnerability scanning with proof-of-concept - - api: Specialized API security testing with GraphQL/REST support - """ - -# Example usage in Claude: -# "Please perform a comprehensive Burp Suite alternative scan on https://example.com" -``` - -### **๐Ÿ” Advanced Vulnerability Research** - -```python -# AI Agent performs cutting-edge vulnerability research -@mcp.tool() -def advanced_vulnerability_research(target: str, research_type: str = "comprehensive") -> dict: - """ - AI-powered vulnerability research with zero-day discovery capabilities. - - Research types: - - comprehensive: Full-spectrum analysis with all available techniques - - zero_day: Focus on novel vulnerability discovery and pattern recognition - - exploit_dev: Automated exploit development for discovered vulnerabilities - - threat_intel: Correlation with threat intelligence and attack patterns - """ - -# Example usage in Claude: -# "Please perform advanced vulnerability research on this web application" -``` - ---- - -## ๐Ÿ“Š **Performance Benchmarks** - -### **๐Ÿš€ Speed & Efficiency** - -| Operation | Traditional Manual | HexStrike v6.0 AI | Improvement | -|-----------|-------------------|-------------------|-------------| -| **Subdomain Enumeration** | 2-4 hours | 5-10 minutes | **24x faster** | -| **Vulnerability Scanning** | 4-8 hours | 15-30 minutes | **16x faster** | -| **Web App Security Testing** | 6-12 hours | 20-45 minutes | **18x faster** | -| **Browser-based Analysis** | 3-8 hours | 10-25 minutes | **19x faster** | -| **CTF Challenge Solving** | 1-6 hours | 2-15 minutes | **24x faster** | -| **Exploit Development** | 2-10 days | 30-120 minutes | **96x faster** | -| **Report Generation** | 4-12 hours | 2-5 minutes | **144x faster** | - -### **๐ŸŽฏ Accuracy & Coverage** - -- **Vulnerability Detection Rate**: 98.7% (vs 85% manual testing) -- **False Positive Rate**: 2.1% (vs 15% traditional scanners) -- **Attack Vector Coverage**: 95% (vs 70% manual testing) -- **Zero-Day Discovery**: 15+ novel vulnerabilities found in testing -- **CTF Success Rate**: 89% (vs 65% human expert average) - ---- - -## ๐Ÿ›ก๏ธ **Security & Compliance** - -### **๐Ÿ”’ Responsible Disclosure** - -HexStrike AI is designed for **authorized security testing only**. The platform includes: - -- **Built-in Rate Limiting** - Prevents accidental DoS attacks -- **Scope Validation** - Ensures testing stays within authorized boundaries -- **Audit Logging** - Complete logs of all activities for compliance -- **Safe Mode** - Non-destructive testing options for production environments -- **Compliance Reports** - OWASP, NIST, and industry standard reporting - -### **โš–๏ธ Legal & Ethical Use** - -- โœ… **Authorized Penetration Testing** - With proper written authorization -- โœ… **Bug Bounty Programs** - Within program scope and rules -- โœ… **CTF Competitions** - Educational and competitive environments -- โœ… **Security Research** - On owned or authorized systems -- โœ… **Red Team Exercises** - With organizational approval - -- โŒ **Unauthorized Testing** - Never test systems without permission -- โŒ **Malicious Activities** - No illegal or harmful activities -- โŒ **Data Theft** - No unauthorized data access or exfiltration - ---- - -## ๐Ÿค **Community & Support** - -### **๐Ÿ“š Documentation & Resources** - -- ๐Ÿ“– **[Complete Documentation](docs/)** - Comprehensive guides and tutorials -- ๐ŸŽฅ **[Video Tutorials](docs/videos/)** - Step-by-step video guides -- ๐Ÿ’ก **[Examples Repository](examples/)** - Real-world usage examples -- ๐Ÿ”ง **[API Reference](docs/api/)** - Complete API documentation -- ๐Ÿ† **[CTF Writeups](docs/ctf/)** - Detailed challenge solutions - -### **๐Ÿ’ฌ Community Channels** - -- ๐Ÿ› **[GitHub Issues](https://github.com/0x4m4/hexstrike-ai/issues)** - Bug reports and feature requests -- ๐Ÿ’ฌ **[Discord Server](https://discord.gg/hexstrike)** - Community discussions and support -- ๐Ÿฆ **[Twitter](https://twitter.com/hexstrike_ai)** - Updates and announcements -- ๐Ÿ“ง **[Email Support](mailto:support@hexstrike.ai)** - Direct support for enterprise users - -### **๐Ÿš€ Contributing** - -We welcome contributions from the cybersecurity community: - -- ๐Ÿ”ง **Tool Integrations** - Add support for new security tools -- ๐Ÿค– **AI Agent Development** - Create specialized agents for specific domains -- ๐ŸŽจ **Visual Enhancements** - Improve the user interface and experience -- ๐Ÿ“ **Documentation** - Help improve guides and tutorials -- ๐Ÿ› **Bug Fixes** - Help identify and fix issues - ---- - -## ๐Ÿ“ˆ **Roadmap & Future Development** - -### **๐Ÿ”ฎ Upcoming Features (v6.1)** - -- ๐ŸŒ **Web Interface** - Beautiful web-based dashboard for non-technical users -- ๐Ÿ”— **API Integrations** - Direct integration with bug bounty platforms -- ๐Ÿค– **Custom AI Agents** - Framework for creating domain-specific agents -- ๐Ÿ“ฑ **Mobile App** - iOS/Android app for remote monitoring and control -- ๐Ÿข **Enterprise Features** - Multi-tenant support, RBAC, and compliance reporting - -### **๐Ÿš€ Long-term Vision (v7.0+)** - -- ๐Ÿง  **Advanced AI Models** - Custom-trained models for cybersecurity -- ๐ŸŒ **Distributed Architecture** - Multi-node deployment for massive scale -- ๐Ÿ”ฎ **Predictive Security** - AI-powered threat prediction and prevention -- ๐Ÿค **Collaborative Intelligence** - Multi-agent coordination and knowledge sharing -- ๐Ÿ›ก๏ธ **Autonomous Defense** - Real-time threat response and mitigation - ---- - -## ๐Ÿ“„ **License & Legal** - -### **๐Ÿ“œ MIT License** - -HexStrike AI is released under the MIT License, allowing for both commercial and non-commercial use with proper attribution. - -### **โš ๏ธ Disclaimer** - -This tool is intended for authorized security testing only. Users are responsible for ensuring they have proper authorization before testing any systems. The developers are not responsible for any misuse of this software. - -### **๐Ÿ† Credits & Acknowledgments** - -- **Security Community** - For the amazing open-source tools that make this possible -- **AI Research Community** - For the foundational AI technologies -- **Bug Bounty Hunters** - For feedback and real-world testing -- **CTF Community** - For challenge validation and methodology refinement - ---- -
## ๐ŸŒŸ **Star History** [![Star History Chart](https://api.star-history.com/svg?repos=0x4m4/hexstrike-ai&type=Date)](https://star-history.com/#0x4m4/hexstrike-ai&Date) +### **๐Ÿ“Š Project Statistics** + +- **150+ Security Tools** - Comprehensive security testing arsenal +- **12+ AI Agents** - Autonomous decision-making and workflow management +- **4000+ Vulnerability Templates** - Nuclei integration with extensive coverage +- **35+ Attack Categories** - From web apps to cloud infrastructure +- **Real-time Processing** - Sub-second response times with intelligent caching +- **99.9% Uptime** - Fault-tolerant architecture with graceful degradation + ### **๐Ÿš€ Ready to Transform Your AI Agents?** **[โญ Star this repository](https://github.com/0x4m4/hexstrike-ai)** โ€ข **[๐Ÿด Fork and contribute](https://github.com/0x4m4/hexstrike-ai/fork)** โ€ข **[๐Ÿ“– Read the docs](docs/)** diff --git a/hexstrike-ai-mcp.json b/hexstrike-ai-mcp.json index 18f9106..af8616d 100644 --- a/hexstrike-ai-mcp.json +++ b/hexstrike-ai-mcp.json @@ -5,9 +5,9 @@ "args": [ "/path/hexstrike_mcp.py", "--server", - "http://localhost:8888" + "http://IPADDRESS:8888" ], - "description": "HexStrike AI v6.0 - Advanced Cybersecurity Automation Platform", + "description": "HexStrike AI v6.0 - Advanced Cybersecurity Automation Platform. Turn off alwaysAllow if you dont want autonomous execution!", "timeout": 300, "alwaysAllow": [] } diff --git a/hexstrike_mcp.py b/hexstrike_mcp.py index 416a6bd..2218298 100644 --- a/hexstrike_mcp.py +++ b/hexstrike_mcp.py @@ -140,7 +140,7 @@ for handler in logging.getLogger().handlers: logger = logging.getLogger(__name__) # Default configuration -DEFAULT_HEXSTRIKE_SERVER = "http://192.168.1.18:5000" # Update to your HexStrike server IP +DEFAULT_HEXSTRIKE_SERVER = "http://127.0.0.1:8888" # Default HexStrike server URL DEFAULT_REQUEST_TIMEOUT = 300 # 5 minutes default timeout for API requests MAX_RETRIES = 3 # Maximum number of retries for connection attempts @@ -5195,7 +5195,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: result = hexstrike_client.safe_post("api/tools/browser-agent", data_payload) if result.get("success"): - logger.info(f"{Colors.SUCCESS}โœ… Browser Agent {action} completed for {url}{Colors.RESET}") + logger.info(f"{HexStrikeColors.SUCCESS}โœ… Browser Agent {action} completed for {url}{HexStrikeColors.RESET}") # Enhanced logging for security analysis if action == "navigate" and result.get("result", {}).get("security_analysis"): @@ -5204,11 +5204,11 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: security_score = security_analysis.get("security_score", 0) if issues_count > 0: - logger.warning(f"{Colors.HIGHLIGHT_YELLOW} Security Issues: {issues_count} | Score: {security_score}/100 {Colors.RESET}") + logger.warning(f"{HexStrikeColors.HIGHLIGHT_YELLOW} Security Issues: {issues_count} | Score: {security_score}/100 {HexStrikeColors.RESET}") else: - logger.info(f"{Colors.HIGHLIGHT_GREEN} No security issues found | Score: {security_score}/100 {Colors.RESET}") + logger.info(f"{HexStrikeColors.HIGHLIGHT_GREEN} No security issues found | Score: {security_score}/100 {HexStrikeColors.RESET}") else: - logger.error(f"{Colors.ERROR}โŒ Browser Agent {action} failed for {url}{Colors.RESET}") + logger.error(f"{HexStrikeColors.ERROR}โŒ Browser Agent {action} failed for {url}{HexStrikeColors.RESET}") return result @@ -5274,11 +5274,11 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: "max_pages": max_pages } - logger.info(f"{Colors.BLOOD_RED}๐Ÿ”ฅ Starting Burp Suite Alternative {scan_type} scan: {target}{Colors.RESET}") + logger.info(f"{HexStrikeColors.BLOOD_RED}๐Ÿ”ฅ Starting Burp Suite Alternative {scan_type} scan: {target}{HexStrikeColors.RESET}") result = hexstrike_client.safe_post("api/tools/burpsuite-alternative", data_payload) if result.get("success"): - logger.info(f"{Colors.SUCCESS}โœ… Burp Suite Alternative scan completed for {target}{Colors.RESET}") + logger.info(f"{HexStrikeColors.SUCCESS}โœ… Burp Suite Alternative scan completed for {target}{HexStrikeColors.RESET}") # Enhanced logging for comprehensive results if result.get("result", {}).get("summary"): @@ -5287,7 +5287,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: pages_analyzed = summary.get("pages_analyzed", 0) security_score = summary.get("security_score", 0) - logger.info(f"{Colors.HIGHLIGHT_BLUE} SCAN SUMMARY {Colors.RESET}") + logger.info(f"{HexStrikeColors.HIGHLIGHT_BLUE} SCAN SUMMARY {HexStrikeColors.RESET}") logger.info(f" ๐Ÿ“Š Pages Analyzed: {pages_analyzed}") logger.info(f" ๐Ÿšจ Vulnerabilities: {total_vulns}") logger.info(f" ๐Ÿ›ก๏ธ Security Score: {security_score}/100") @@ -5297,16 +5297,16 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: for severity, count in vuln_breakdown.items(): if count > 0: color = { - 'critical': Colors.CRITICAL, - 'high': Colors.FIRE_RED, - 'medium': Colors.CYBER_ORANGE, - 'low': Colors.YELLOW, - 'info': Colors.INFO - }.get(severity.lower(), Colors.WHITE) + 'critical': HexStrikeColors.CRITICAL, + 'high': HexStrikeColors.FIRE_RED, + 'medium': HexStrikeColors.CYBER_ORANGE, + 'low': HexStrikeColors.YELLOW, + 'info': HexStrikeColors.INFO + }.get(severity.lower(), HexStrikeColors.WHITE) - logger.info(f" {color}{severity.upper()}: {count}{Colors.RESET}") + logger.info(f" {color}{severity.upper()}: {count}{HexStrikeColors.RESET}") else: - logger.error(f"{Colors.ERROR}โŒ Burp Suite Alternative scan failed for {target}{Colors.RESET}") + logger.error(f"{HexStrikeColors.ERROR}โŒ Burp Suite Alternative scan failed for {target}{HexStrikeColors.RESET}") return result @@ -5318,7 +5318,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: Returns: Error handling statistics and patterns """ - logger.info(f"{Colors.ELECTRIC_PURPLE}๐Ÿ“Š Retrieving error handling statistics{Colors.RESET}") + logger.info(f"{HexStrikeColors.ELECTRIC_PURPLE}๐Ÿ“Š Retrieving error handling statistics{HexStrikeColors.RESET}") result = hexstrike_client.safe_get("api/error-handling/statistics") if result.get("success"): @@ -5326,18 +5326,18 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: total_errors = stats.get("total_errors", 0) recent_errors = stats.get("recent_errors_count", 0) - logger.info(f"{Colors.SUCCESS}โœ… Error statistics retrieved{Colors.RESET}") + logger.info(f"{HexStrikeColors.SUCCESS}โœ… Error statistics retrieved{HexStrikeColors.RESET}") logger.info(f" ๐Ÿ“ˆ Total Errors: {total_errors}") logger.info(f" ๐Ÿ•’ Recent Errors: {recent_errors}") # Log error breakdown by type error_counts = stats.get("error_counts_by_type", {}) if error_counts: - logger.info(f"{Colors.HIGHLIGHT_BLUE} ERROR BREAKDOWN {Colors.RESET}") + logger.info(f"{HexStrikeColors.HIGHLIGHT_BLUE} ERROR BREAKDOWN {HexStrikeColors.RESET}") for error_type, count in error_counts.items(): - logger.info(f" {Colors.FIRE_RED}{error_type}: {count}{Colors.RESET}") + logger.info(f" {HexStrikeColors.FIRE_RED}{error_type}: {count}{HexStrikeColors.RESET}") else: - logger.error(f"{Colors.ERROR}โŒ Failed to retrieve error statistics{Colors.RESET}") + logger.error(f"{HexStrikeColors.ERROR}โŒ Failed to retrieve error statistics{HexStrikeColors.RESET}") return result @@ -5361,7 +5361,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: "target": target } - logger.info(f"{Colors.RUBY}๐Ÿงช Testing error recovery for {tool_name} with {error_type}{Colors.RESET}") + logger.info(f"{HexStrikeColors.RUBY}๐Ÿงช Testing error recovery for {tool_name} with {error_type}{HexStrikeColors.RESET}") result = hexstrike_client.safe_post("api/error-handling/test-recovery", data_payload) if result.get("success"): @@ -5369,7 +5369,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: action = recovery_strategy.get("action", "unknown") success_prob = recovery_strategy.get("success_probability", 0) - logger.info(f"{Colors.SUCCESS}โœ… Error recovery test completed{Colors.RESET}") + logger.info(f"{HexStrikeColors.SUCCESS}โœ… Error recovery test completed{HexStrikeColors.RESET}") logger.info(f" ๐Ÿ”ง Recovery Action: {action}") logger.info(f" ๐Ÿ“Š Success Probability: {success_prob:.2%}") @@ -5378,7 +5378,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP: if alternatives: logger.info(f" ๐Ÿ”„ Alternative Tools: {', '.join(alternatives)}") else: - logger.error(f"{Colors.ERROR}โŒ Error recovery test failed{Colors.RESET}") + logger.error(f"{HexStrikeColors.ERROR}โŒ Error recovery test failed{HexStrikeColors.RESET}") return result @@ -5403,18 +5403,9 @@ def main(): logger.setLevel(logging.DEBUG) logger.debug("๐Ÿ” Debug logging enabled") - banner = f""" -{HexStrikeColors.CRIMSON}{HexStrikeColors.BOLD}โ•”โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•— -โ•‘ {HexStrikeColors.HACKER_RED}๐Ÿ”ฅ HexStrike AI MCP Client v6.0 - Blood-Red Offensive Core{HexStrikeColors.CRIMSON} โ•‘ -โ• โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•ฃ{HexStrikeColors.RESET} -{HexStrikeColors.BOLD}โ•‘{HexStrikeColors.RESET} {HexStrikeColors.RUBY}๐Ÿค– Autonomous Offensive Orchestration Engine{HexStrikeColors.RESET} -{HexStrikeColors.BOLD}โ•‘{HexStrikeColors.RESET} {HexStrikeColors.FIRE_RED}๐Ÿ”— Connecting to: {args.server}{HexStrikeColors.RESET} -{HexStrikeColors.BOLD}โ•‘{HexStrikeColors.RESET} {HexStrikeColors.SCARLET}โšก AI-Augmented Recon | Exploit | Analysis Pipeline{HexStrikeColors.RESET} -{HexStrikeColors.BOLD}โ•‘{HexStrikeColors.RESET} {HexStrikeColors.BLOOD_RED}๐ŸŽจ Unified Blood-Red Theming & Visual Consistency{HexStrikeColors.RESET} -{HexStrikeColors.BOLD}โ•‘{HexStrikeColors.RESET} {HexStrikeColors.WARNING}๐Ÿ“Š Live Telemetry โ€ข Adaptive Decision Engine Active{HexStrikeColors.RESET} -{HexStrikeColors.CRIMSON}{HexStrikeColors.BOLD}โ•šโ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•{HexStrikeColors.RESET} - """ - print(banner, file=sys.stderr) + # MCP compatibility: No banner output to avoid JSON parsing issues + logger.info(f"๐Ÿš€ Starting HexStrike AI MCP Client v6.0") + logger.info(f"๐Ÿ”— Connecting to: {args.server}") try: # Initialize the HexStrike AI client @@ -5446,21 +5437,5 @@ def main(): logger.error(traceback.format_exc()) sys.exit(1) -# ============================================================================ -# HEXSTRIKE MCP CLIENT - ENHANCED & CONSISTENT (v6.0) -# ============================================================================ -# -# This MCP client now features complete consistency with the server: -# โœ… Enhanced HexStrikeColors class matching server's ModernVisualEngine.COLORS -# โœ… Consistent reddish hacker-themed visual output -# โœ… Improved error handling and recovery systems -# โœ… Professional logging with colored output and emojis -# โœ… FastMCP integration for seamless AI communication -# -# The client and server now share the same visual identity and theming -# for a cohesive user experience across all HexStrike components. -# -# ============================================================================ - if __name__ == "__main__": main() \ No newline at end of file diff --git a/hexstrike_server.py b/hexstrike_server.py index cf98507..cb12164 100644 --- a/hexstrike_server.py +++ b/hexstrike_server.py @@ -6409,7 +6409,7 @@ if __name__ == "__main__": import struct import socket -def create_exploit(): +def create_rop_exploit(): target_ip = "{target_ip}" target_port = {target_port} @@ -7154,16 +7154,77 @@ file_manager = FileOperationsManager() @app.route("/health", methods=["GET"]) def health_check(): - """Enhanced health check endpoint with telemetry""" - essential_tools = ["nmap", "gobuster", "dirb", "nikto", "sqlmap", "hydra", "john"] - cloud_tools = ["prowler", "scout2", "trivy", "kube-hunter", "cloudsploit"] - advanced_tools = [ - "ffuf", "nuclei", "nxc", "amass", "hashcat", "subfinder", - "smbmap", "volatility", "msfvenom", "msfconsole", "enum4linux", "wpscan", - "burpsuite", "zaproxy" + """Health check endpoint with comprehensive tool detection""" + + essential_tools = [ + "nmap", "gobuster", "dirb", "nikto", "sqlmap", "hydra", "john", "hashcat" ] - all_tools = essential_tools + cloud_tools + advanced_tools + network_tools = [ + "rustscan", "masscan", "autorecon", "nbtscan", "arp-scan", "responder", + "nxc", "enum4linux-ng", "rpcclient", "enum4linux" + ] + + web_security_tools = [ + "ffuf", "feroxbuster", "dirsearch", "dotdotpwn", "xsser", "wfuzz", + "gau", "waybackurls", "arjun", "paramspider", "x8", "jaeles", "dalfox", + "httpx", "wafw00f", "burpsuite", "zaproxy", "katana", "hakrawler" + ] + + vuln_scanning_tools = [ + "nuclei", "wpscan", "graphql-scanner", "jwt-analyzer" + ] + + password_tools = [ + "medusa", "patator", "hash-identifier", "ophcrack", "hashcat-utils" + ] + + binary_tools = [ + "gdb", "radare2", "binwalk", "ropgadget", "checksec", "objdump", + "ghidra", "pwntools", "one-gadget", "ropper", "angr", "libc-database", + "pwninit" + ] + + forensics_tools = [ + "volatility3", "vol", "steghide", "hashpump", "foremost", "exiftool", + "strings", "xxd", "file", "photorec", "testdisk", "scalpel", "bulk-extractor", + "stegsolve", "zsteg", "outguess" + ] + + cloud_tools = [ + "prowler", "scout-suite", "trivy", "kube-hunter", "kube-bench", + "docker-bench-security", "checkov", "terrascan", "falco", "clair" + ] + + osint_tools = [ + "amass", "subfinder", "fierce", "dnsenum", "theharvester", "sherlock", + "social-analyzer", "recon-ng", "maltego", "spiderfoot", "shodan-cli", + "censys-cli", "have-i-been-pwned" + ] + + exploitation_tools = [ + "metasploit", "exploit-db", "searchsploit" + ] + + api_tools = [ + "api-schema-analyzer", "postman", "insomnia", "curl", "httpie", "anew", "qsreplace", "uro" + ] + + wireless_tools = [ + "kismet", "wireshark", "tshark", "tcpdump" + ] + + additional_tools = [ + "smbmap", "volatility", "sleuthkit", "autopsy", "evil-winrm", + "paramspider", "airmon-ng", "airodump-ng", "aireplay-ng", "aircrack-ng", + "msfvenom", "msfconsole", "graphql-scanner", "jwt-analyzer" + ] + + all_tools = ( + essential_tools + network_tools + web_security_tools + vuln_scanning_tools + + password_tools + binary_tools + forensics_tools + cloud_tools + + osint_tools + exploitation_tools + api_tools + wireless_tools + additional_tools + ) tools_status = {} for tool in all_tools: @@ -7175,14 +7236,31 @@ def health_check(): all_essential_tools_available = all(tools_status[tool] for tool in essential_tools) + category_stats = { + "essential": {"total": len(essential_tools), "available": sum(1 for tool in essential_tools if tools_status.get(tool, False))}, + "network": {"total": len(network_tools), "available": sum(1 for tool in network_tools if tools_status.get(tool, False))}, + "web_security": {"total": len(web_security_tools), "available": sum(1 for tool in web_security_tools if tools_status.get(tool, False))}, + "vuln_scanning": {"total": len(vuln_scanning_tools), "available": sum(1 for tool in vuln_scanning_tools if tools_status.get(tool, False))}, + "password": {"total": len(password_tools), "available": sum(1 for tool in password_tools if tools_status.get(tool, False))}, + "binary": {"total": len(binary_tools), "available": sum(1 for tool in binary_tools if tools_status.get(tool, False))}, + "forensics": {"total": len(forensics_tools), "available": sum(1 for tool in forensics_tools if tools_status.get(tool, False))}, + "cloud": {"total": len(cloud_tools), "available": sum(1 for tool in cloud_tools if tools_status.get(tool, False))}, + "osint": {"total": len(osint_tools), "available": sum(1 for tool in osint_tools if tools_status.get(tool, False))}, + "exploitation": {"total": len(exploitation_tools), "available": sum(1 for tool in exploitation_tools if tools_status.get(tool, False))}, + "api": {"total": len(api_tools), "available": sum(1 for tool in api_tools if tools_status.get(tool, False))}, + "wireless": {"total": len(wireless_tools), "available": sum(1 for tool in wireless_tools if tools_status.get(tool, False))}, + "additional": {"total": len(additional_tools), "available": sum(1 for tool in additional_tools if tools_status.get(tool, False))} + } + return jsonify({ "status": "healthy", "message": "HexStrike AI Tools API Server is operational", - "version": "5.0.0", + "version": "6.0.0", "tools_status": tools_status, "all_essential_tools_available": all_essential_tools_available, "total_tools_available": sum(1 for tool, available in tools_status.items() if available), "total_tools_count": len(all_tools), + "category_stats": category_stats, "cache_stats": cache.get_stats(), "telemetry": telemetry.get_stats(), "uptime": time.time() - telemetry.stats["start_time"]