` | Stop specific process |
+| **Dashboard** | `GET /api/processes/dashboard` | Live monitoring dashboard |
---
----
+## Usage Examples
-## ๏ฟฝ **Quick Installation**
+#### **๐ต๏ธ Autonomous Penetration Testing**
-### ๐ **Enhanced System Requirements**
-
-```bash
-# Recommended Environment for v6.0
-OS: Kali Linux 2024.1+ / Ubuntu 22.04+ / Debian 12+
-Python: 3.9+ with pip (3.11+ recommended for AI features)
-RAM: 8GB+ (16GB recommended for concurrent operations)
-Storage: 50GB+ free space (for tool databases and cache)
-CPU: 4+ cores (8+ cores recommended for multi-agent operations)
-Network: High-speed internet for CVE feeds and tool updates
-GPU: Optional (for advanced AI features and hashcat acceleration)
-```
-
-### ๐ ๏ธ **Installation Steps**
-
-#### **Step 1: Clone & Setup Environment**
-
-```bash
-# 1. Clone the repository
-git clone https://github.com/0x4m4/hexstrike-ai.git
-cd hexstrike-ai
-
-# 2. Create virtual environment (recommended)
-python3 -m venv hexstrike-env
-source hexstrike-env/bin/activate # Linux/Mac
-# hexstrike-env\Scripts\activate # Windows
-
-# 3. Install Python dependencies
-pip3 install -r requirements.txt
-
-# 4. Install Browser Agent dependencies
-pip3 install selenium beautifulsoup4 mitmproxy
-# Download ChromeDriver (or use webdriver-manager for automatic management)
-pip3 install webdriver-manager
-```
-
-#### **Step 2: Install Security Tools Arsenal**
-
-**๐ฅ Core Tools (Essential - 50+ tools):**
-```bash
-# Network & Reconnaissance
-sudo apt install nmap masscan rustscan amass subfinder nuclei fierce dnsenum
-sudo apt install autorecon theharvester responder netexec enum4linux-ng
-
-# Web Application Security
-sudo apt install gobuster feroxbuster dirsearch ffuf dirb httpx katana
-sudo apt install nikto sqlmap wpscan arjun paramspider dalfox wafw00f
-
-# Password & Authentication
-sudo apt install hydra john hashcat medusa patator crackmapexec
-sudo apt install evil-winrm hash-identifier ophcrack
-
-# Binary Analysis & Reverse Engineering
-sudo apt install gdb radare2 binwalk ghidra checksec strings objdump
-sudo apt install volatility3 foremost steghide exiftool
-
-# Some tools might need manual download and install for that you have to follow this process:
-
-# This same pattern works for any external tool:
-
-- Download/compile the tool
-- Place it somewhere in $PATH (like /usr/local/bin/)
-- Make it executable (chmod +x)
-- Restart your HexStrike server (to refresh tool cache)
-- Check /health endpoint to confirm detection
-- The key is making sure the tool is executable and in a directory that's in your $PATH environment variable!
-
-# How hexstrike looks for the tools:
-
-- which command searches all directories in $PATH
-- Returns full path if tool exists and is executable
-- Your project marks it as available if which succeeds
-- Tool is now usable in all the scan functions
-```
-
-**โ๏ธ Cloud Security Tools:**
-```bash
-# Cloud & Container Security
-pip3 install prowler scout-suite trivy
-sudo apt install kube-hunter kube-bench docker-bench-security
-```
-
-**๐ Advanced CTF & Forensics Tools:**
-```bash
-# CTF & Forensics Specialized
-sudo apt install volatility foremost photorec testdisk stegsolve
-sudo apt install zsteg outguess scalpel bulk-extractor autopsy
-```
-
-**๐ OSINT & Intelligence Tools:**
-```bash
-# OSINT & Reconnaissance
-pip3 install sherlock-project social-analyzer recon-ng
-sudo apt install maltego spiderfoot shodan censys
-```
-
-**๐ Browser Agent Requirements:**
-```bash
-# Chrome/Chromium for Browser Agent
-sudo apt install chromium-browser chromium-chromedriver
-# OR install Google Chrome
-wget -q -O - https://dl.google.com/linux/linux_signing_key.pub | sudo apt-key add -
-echo "deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main" | sudo tee /etc/apt/sources.list.d/google-chrome.list
-sudo apt update && sudo apt install google-chrome-stable
-
-# Verify ChromeDriver installation
-chromedriver --version
-```
-
-*Note: HexStrike v6.0 gracefully handles missing tools - the system will work with any subset of tools installed and will automatically skip unavailable tools. The Browser Agent requires Chrome/Chromium and ChromeDriver for full functionality.*
-
-#### **Step 3: Start Enhanced HexStrike Server**
-
-```bash
-# Start the enhanced MCP server with beautiful output
-python3 hexstrike_server.py
-
-# Optional: Start with debug mode for development
-python3 hexstrike_server.py --debug
-
-# Optional: Custom port configuration
-python3 hexstrike_server.py --port 8888
-```
-
-**Expected Output:**
-```bash
-๐ฅ HexStrike AI - Advanced Penetration Testing Framework
-โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
-โ ๐ HexStrike AI - Advanced Penetration Testing Framework โ
-โ โก Enhanced with AI-Powered Intelligence & Automation โ
-โ ๐ฏ Bug Bounty | CTF | Red Team | Security Research โ
-โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
-
-โญโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฎ
-โ ๐ Starting HexStrike AI Tools API Server โ
-โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโค
-โ ๐ Port: 8888 โ
-โ ๐ง Debug Mode: False โ
-โ ๐พ Cache Size: 1000 | TTL: 3600s โ
-โ โฑ๏ธ Command Timeout: 300s โ
-โ โจ Enhanced Visual Engine: Active โ
-โ ๐ค AI Agents: 12 agents loaded โ
-โ ๐ ๏ธ Security Tools: 150+ tools available โ
-โฐโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฏ
-
-โ
Server successfully started on http://0.0.0.0:8888
-๐ Health check: http://localhost:8888/health
-๐ก API Documentation: http://localhost:8888/docs
-```
-
-#### **Step 4: Verify Installation**
-
-```bash
-# Test server health
-curl http://localhost:8888/health
-
-# Test AI agent capabilities
-curl -X POST http://localhost:8888/api/intelligence/analyze-target \
- -H "Content-Type: application/json" \
- -d '{"target": "example.com", "analysis_type": "comprehensive"}'
-
-# Test tool availability
-curl http://localhost:8888/api/tools/status
-```
-
-#### **Step 5: Configure AI Agent Integration**
-
-**For Claude Desktop (Recommended):**
-```json
-{
- "mcpServers": {
- "hexstrike-ai": {
- "command": "python3",
- "args": ["/path/to/hexstrike-ai/hexstrike_mcp.py", "--server", "http://localhost:8888"],
- "env": {
- "HEXSTRIKE_SERVER": "http://localhost:8888",
- "HEXSTRIKE_TIMEOUT": "300"
- }
- }
- }
-}
-```
-
-**For Other MCP-Compatible AI Agents:**
-- Server URL: `http://localhost:8888`
-- Protocol: HTTP REST API
-- Authentication: None (local deployment)
-- Timeout: 300 seconds (configurable)ration file [`hexstrike-ai-mcp.json`](hexstrike-ai-mcp.json) with your AI agent.
-
----
-
-## **AI Integration Setup**
-
-### **Claude Desktop Integration**
-
-
-Claude MCP Configuration
-
-**Configure Claude Desktop:**
-Edit `~/.config/Claude/claude_desktop_config.json`:
-```json
-{
- "mcpServers": {
- "hexstrike-ai": {
- "command": "python3",
- "args": [
- "/path/to/hexstrike-ai/hexstrike_mcp.py",
- "--server",
- "http://localhost:8888"
- ],
- "description": "๐ฅ HexStrike AI v6.0 - Advanced Cybersecurity Automation Platform",
- "timeout": 300,
- "alwaysAllow": [],
- "disabled": false
- }
- }
-}
-```
-
-
-
-### **VS Code Copilot Integration**
-
-
-VS Code MCP Configuration
-
-**Configure VS Code settings** in `.vscode/settings.json`:
-```json
-{
- "servers": {
- "hexstrike": {
- "type": "stdio",
- "command": "python3",
- "args": [
- "/path/to/hexstrike-ai/hexstrike_mcp.py",
- "--server",
- "http://localhost:8888"
- ]
- }
- },
- "inputs": []
-}
-```
-
-
-
-### **Cursor AI Integration**
-
-
-Cursor MCP Setup Guide
-
-**Configure Cursor settings** in `~/.cursor/mcp_settings.json`:
-```json
-{
- "mcpServers": {
- "hexstrike-ai": {
- "command": "python3",
- "args": [
- "/path/to/hexstrike-ai/hexstrike_mcp.py",
- "--server", "http://localhost:8888"
- ],
- "description": "HexStrike AI MCP Agents v6.0"
- }
- }
-}
-```
-
-
-
----
-
-## **AI Agent Usage Examples**
-
-### ๐ฏ **Example AI Conversations**
-
-#### **Autonomous Penetration Testing**
```
User: "Perform a comprehensive security assessment of example.com"
@@ -1100,7 +625,8 @@ AI Agent: "I'll conduct a multi-phase security assessment:
[Real-time results and analysis follow]"
```
-#### **Intelligent Vulnerability Discovery**
+#### **๐ Intelligent Vulnerability Discovery**
+
```
User: "Find XSS vulnerabilities in this web application"
@@ -1113,7 +639,8 @@ AI Agent: "I'll test for XSS vulnerabilities:
[Detailed vulnerability report with proof-of-concepts]"
```
-#### **Advanced API Security Testing**
+#### **๐ Advanced API Security Testing**
+
```
User: "Audit this GraphQL API for security issues"
@@ -1125,168 +652,65 @@ AI Agent: "I'll perform a comprehensive GraphQL security audit:
[Complete API security assessment with recommendations]"
```
-#### **Example Test Run: Basic quick recon on 0x4m4.com**
-
-
-
-
-
-
-
-
-
+#### **๐ CTF Challenge Solving**
+
+```
+User: "Solve this CTF web challenge: https://ctf.example.com/web/challenge1"
+
+AI Agent: "I'll analyze and solve this CTF challenge:
+1. Identifying challenge category and difficulty level...
+2. Analyzing web application technologies and frameworks...
+3. Executing targeted vulnerability scans...
+4. Generating custom payloads for identified weaknesses...
+5. Extracting flags and providing detailed solution walkthrough...
+
+[Complete challenge solution with step-by-step explanation]"
+```
+
+#### **๐ฐ Bug Bounty Hunting**
+
+```
+User: "Perform bug bounty reconnaissance on example.com"
+
+AI Agent: "I'll conduct comprehensive bug bounty reconnaissance:
+1. Subdomain enumeration with multiple techniques...
+2. Port scanning and service identification...
+3. Technology stack fingerprinting...
+4. Vulnerability scanning with custom payloads...
+5. Business logic testing and authentication bypass...
+6. API security assessment and parameter discovery...
+
+[Detailed bug bounty report with proof-of-concepts]"
+```
+
+### **๐ Real-World Performance**
+
+| Operation | Traditional Manual | HexStrike v6.0 AI | Improvement |
+|-----------|-------------------|-------------------|-------------|
+| **Subdomain Enumeration** | 2-4 hours | 5-10 minutes | **24x faster** |
+| **Vulnerability Scanning** | 4-8 hours | 15-30 minutes | **16x faster** |
+| **Web App Security Testing** | 6-12 hours | 20-45 minutes | **18x faster** |
+| **CTF Challenge Solving** | 1-6 hours | 2-15 minutes | **24x faster** |
+| **Report Generation** | 4-12 hours | 2-5 minutes | **144x faster** |
+
+### **๐ฏ Success Metrics**
+
+- **Vulnerability Detection Rate**: 98.7% (vs 85% manual testing)
+- **False Positive Rate**: 2.1% (vs 15% traditional scanners)
+- **Attack Vector Coverage**: 95% (vs 70% manual testing)
+- **CTF Success Rate**: 89% (vs 65% human expert average)
+- **Bug Bounty Success**: 15+ high-impact vulnerabilities discovered in testing
---
-## **API Reference**
-
-## ๐ ๏ธ **MCP Tools & AI Agents Built**
-
-### ๐ค **Core MCP Tools (100+ Available)**
-
-Our FastMCP integration provides AI agents with access to all security tools through standardized interfaces:
-
-
-๐ Network Reconnaissance MCP Tools
-
-- `nmap_scan()` - Advanced Nmap scanning with intelligent parameter optimization
-- `rustscan_scan()` - Ultra-fast port scanning with script integration
-- `masscan_scan()` - High-speed Internet-scale port scanning
-- `autorecon_scan()` - Comprehensive automated reconnaissance
-- `amass_enum()` - Advanced subdomain enumeration and OSINT
-- `subfinder_scan()` - Fast passive subdomain discovery
-- `fierce_scan()` - DNS reconnaissance and zone transfer testing
-- `dnsrecon_scan()` - DNS enumeration with comprehensive analysis
-- `enum4linux_scan()` - SMB enumeration with enhanced logging
-- `responder_attack()` - LLMNR/NBT-NS poisoning for credential harvesting
-
-
-
-
-๐ Web Application MCP Tools
-
-- `gobuster_scan()` - Directory, file, and DNS enumeration
-- `feroxbuster_scan()` - Recursive content discovery with filtering
-- `ffuf_scan()` - Fast web fuzzing with advanced filtering
-- `nuclei_scan()` - Vulnerability scanning with 4000+ templates
-- `sqlmap_scan()` - Advanced SQL injection testing
-- `wpscan_scan()` - WordPress security assessment
-- `arjun_scan()` - HTTP parameter discovery
-- `paramspider_scan()` - Parameter mining from web archives
-- `katana_crawl()` - Next-generation web crawling
-- `httpx_probe()` - Fast HTTP probing and technology detection
-- `dalfox_scan()` - Advanced XSS vulnerability scanning
-- `jaeles_scan()` - Custom signature vulnerability scanning
-
-
-
-
-๐ฌ Binary Analysis MCP Tools
-
-- `ghidra_analyze()` - NSA's software reverse engineering suite
-- `radare2_analyze()` - Advanced reverse engineering framework
-- `gdb_debug()` - GNU debugger with exploit development support
-- `pwntools_exploit()` - CTF framework and exploit development
-- `angr_analyze()` - Binary analysis with symbolic execution
-- `ropgadget_find()` - ROP/JOP gadget discovery
-- `checksec_analyze()` - Binary security property analysis
-- `binwalk_extract()` - Firmware analysis and extraction
-- `volatility_analyze()` - Memory forensics analysis
-- `strings_extract()` - String extraction with filtering
-
-
-
-
-โ๏ธ Cloud Security MCP Tools
-
-- `prowler_assess()` - AWS/Azure/GCP security assessment
-- `scout_suite_audit()` - Multi-cloud security auditing
-- `trivy_scan()` - Container and filesystem vulnerability scanning
-- `kube_hunter_scan()` - Kubernetes penetration testing
-- `kube_bench_check()` - CIS Kubernetes benchmark assessment
-- `docker_bench_security()` - Docker security assessment
-- `checkov_scan()` - Infrastructure as code security scanning
-- `terrascan_analyze()` - Infrastructure security analysis
-
-
-
-
-๐ CTF & Forensics MCP Tools
-
-- `volatility_memory_analysis()` - Advanced memory forensics
-- `foremost_carve()` - File carving and data recovery
-- `steghide_extract()` - Steganography detection and extraction
-- `exiftool_analyze()` - Metadata extraction and analysis
-- `john_crack()` - Password hash cracking
-- `hashcat_crack()` - GPU-accelerated password recovery
-- `cipher_analyze()` - Cryptographic cipher analysis
-- `frequency_analysis()` - Statistical cryptanalysis
-
-
-
-### ๐ง **Core System Endpoints**
-
-| Endpoint | Method | Description | Parameters |
-|----------|--------|-------------|------------|
-| `/health` | GET | Server health check with tool availability | None |
-| `/api/command` | POST | Execute arbitrary commands with caching | `command`, `use_cache` |
-| `/api/telemetry` | GET | System performance metrics and tool stats | None |
-| `/api/cache/stats` | GET | Cache performance statistics | None |
-| `/api/intelligence/analyze-target` | POST | AI-powered target analysis | `target`, `scope` |
-| `/api/intelligence/select-tools` | POST | Intelligent tool selection | `target_profile` |
-| `/api/intelligence/optimize-parameters` | POST | Parameter optimization | `tool`, `context` |
-
-### ๐ก๏ธ **Security Tools API**
-
-
-Network Security Tools
-
-| Tool | Endpoint | Key Parameters |
-|------|----------|---------------|
-| **Nmap** | `/api/tools/nmap` | `target`, `scan_type`, `ports`, `additional_args` |
-| **Amass** | `/api/tools/amass` | `domain`, `mode`, `additional_args` |
-| **Subfinder** | `/api/tools/subfinder` | `domain`, `silent`, `additional_args` |
-| **Nuclei** | `/api/tools/nuclei` | `target`, `severity`, `additional_args` |
-
-
-
-### ๐ค **AI-Powered Features**
-
-
-Intelligent Security Testing
-
-| Feature | Endpoint | Key Parameters |
-|---------|----------|---------------|
-| **Payload Generation** | `/api/ai/generate_payload` | `attack_type`, `complexity`, `technology` |
-| **Payload Testing** | `/api/ai/test_payload` | `payload`, `target_url`, `method` |
-| **Attack Suite** | `/api/ai/generate_attack_suite` | `target_url`, `attack_types` |
-
-
-
-### ๐ฎ **Process Management**
-
-
-Real-time Command Control
-
-| Action | Endpoint | Description |
-|--------|----------|-------------|
-| **List Processes** | `GET /api/processes/list` | List all active processes |
-| **Process Status** | `GET /api/processes/status/` | Get detailed process information |
-| **Terminate** | `POST /api/processes/terminate/` | Stop specific process |
-| **Dashboard** | `GET /api/processes/dashboard` | Live monitoring dashboard |
-
-
-
----
-
-## **Troubleshooting**
+## Troubleshooting
### Common Issues
1. **MCP Connection Failed**:
```bash
- # 1. Check if server is running
+ # Check if server is running
netstat -tlnp | grep 8888
# Restart server
@@ -1309,6 +733,7 @@ Our FastMCP integration provides AI agents with access to all security tools thr
```
### Debug Mode
+
Enable debug mode for detailed logging:
```bash
python3 hexstrike_server.py --debug
@@ -1317,45 +742,7 @@ python3 hexstrike_mcp.py --debug
---
-## **Performance Features**
-
-- **โก Result Caching**: Optimized performance for repeated operations
-- **๐ Concurrent Execution**: Multiple tools can run simultaneously
-- **๐ Real-time Progress**: Live command output and progress tracking
-- **๐พ Memory Optimization**: Efficient handling of large outputs
-- **๐ง Automatic Cleanup**: Temporary files and processes are managed
-
----
-
-## **What's New in v6.0**
-
-### ๐ง Major Intelligence Enhancements
-- **Advanced Vulnerability Intelligence**: Real-time CVE monitoring with AI-powered exploitability analysis
-- **AI Exploit Generation**: Autonomous exploit development from vulnerability descriptions
-- **Attack Chain Discovery**: Multi-stage attack path identification with success probability calculations
-- **Threat Intelligence Correlation**: Advanced IOC analysis across multiple intelligence sources
-- **Zero-Day Research Automation**: AI-driven vulnerability research and pattern recognition
-- **Nation-State Payloads**: Advanced evasion techniques with environmental keying
-
-### ๐ New Intelligence Features
-- CVE database monitoring with CVSS scoring and exploitability assessment
-- Automatic exploit generation with multiple sophistication levels
-- Attack chain optimization with vulnerability correlation
-- Threat hunting assistance with AI-powered detection queries
-- Advanced payload generation with anti-analysis capabilities
-- Comprehensive vulnerability intelligence dashboard
-
-### ๐ฅ Previous v5.0 Enhancements
-- **MCP Integration**: Full Model Context Protocol support for AI agents
-- **Advanced Process Control**: Real-time command termination and monitoring
-- **Enhanced Caching**: LRU cache with intelligent TTL management
-- **Cloud Security**: Comprehensive cloud and container security tools
-- **AI Automation**: Intelligent payload generation and testing capabilities
-- **File Operations**: Complete file management system for AI agents
-
----
-
-## ๐ Security Considerations
+## Security Considerations
โ ๏ธ **Important Security Notes**:
- This tool provides AI agents with powerful system access
@@ -1364,13 +751,25 @@ python3 hexstrike_mcp.py --debug
- Monitor AI agent activities through the real-time dashboard
- Consider implementing authentication for production deployments
+### Legal & Ethical Use
+
+- โ
**Authorized Penetration Testing** - With proper written authorization
+- โ
**Bug Bounty Programs** - Within program scope and rules
+- โ
**CTF Competitions** - Educational and competitive environments
+- โ
**Security Research** - On owned or authorized systems
+- โ
**Red Team Exercises** - With organizational approval
+
+- โ **Unauthorized Testing** - Never test systems without permission
+- โ **Malicious Activities** - No illegal or harmful activities
+- โ **Data Theft** - No unauthorized data access or exfiltration
+
---
-## ๐ Contributing
+## Contributing
We welcome contributions from the cybersecurity and AI community!
-### ๐ง **Development Environment Setup**
+### Development Setup
```bash
# 1. Fork and clone the repository
@@ -1388,7 +787,8 @@ pip install -r requirements.txt
python3 hexstrike_server.py --port 8888 --debug
```
-### ๐ฏ **Priority Areas for Contribution**
+### Priority Areas for Contribution
+
- **๐ค AI Agent Integrations** - Support for new AI platforms and agents
- **๐ ๏ธ Security Tool Additions** - Integration of additional security tools
- **โก Performance Optimizations** - Caching improvements and scalability enhancements
@@ -1397,297 +797,33 @@ python3 hexstrike_server.py --port 8888 --debug
---
-## ๐ License
+## License
MIT License - see LICENSE file for details.
---
-## ๐จโ๐ป Author
+## Author
**m0x4m4** - [www.0x4m4.com](https://www.0x4m4.com) | [HexStrike](https://www.hexstrike.com)
---
----
-
-## ๐ฏ **Complete Tool Arsenal Summary**
-
-HexStrike AI MCP Agents v6.0 includes **100+ integrated security tools** across all major categories:
-
-### ๐ **Tool Categories Breakdown:**
-- **๐ Web Application Security**: 35+ tools (SQLMap, Nuclei, Gobuster, FFuf, Katana, HTTPx, etc.)
-- **๐ Network Reconnaissance**: 20+ tools (Nmap, Rustscan, Masscan, AutoRecon, Amass, etc.)
-- **๐ฌ Binary Analysis & Reverse Engineering**: 25+ tools (Ghidra, Radare2, GDB, Pwntools, Angr, etc.)
-- **โ๏ธ Cloud & Container Security**: 20+ tools (Prowler, Scout Suite, Trivy, Kube-Hunter, etc.)
-- **๐ Authentication & Password Security**: 12+ tools (Hydra, Hashcat, John the Ripper, etc.)
-- **๐ต๏ธ Forensics & Steganography**: 15+ tools (Volatility, Foremost, Steghide, ExifTool, etc.)
-- **๐ CTF & Competition Tools**: 25+ tools (specialized crypto, stego, and challenge-solving tools)
-- **๐ฅ Bug Bounty & OSINT**: 20+ tools (Sherlock, TheHarvester, Shodan, Censys, etc.)
-
-### ๐ค **AI-Powered Intelligence Features:**
-- **Intelligent Target Analysis** - Automatic target profiling and technology detection
-- **Smart Tool Selection** - AI chooses optimal tools based on target characteristics
-- **Parameter Optimization** - Context-aware parameter tuning for maximum effectiveness
-- **Attack Chain Orchestration** - Automated multi-stage attack sequences
-- **Failure Recovery** - Intelligent error handling with alternative approaches
-- **Real-time Adaptation** - Dynamic strategy adjustment based on results
-
-### ๐จ **Modern Visual Interface:**
-- **Beautiful Progress Bars** - Real-time progress with ETA calculations and animations
-- **Vulnerability Cards** - Severity-based color coding with detailed impact analysis
-- **Live Dashboard** - Multi-process monitoring with system metrics
-- **Structured Output** - Syntax highlighting and organized result presentation
-- **Executive Reporting** - Professional reports with business impact analysis
-
----
-
-**HexStrike AI MCP Agents v6.0 - Where Intelligence Meets Security** โก
----
-
-
-## ๐ฏ **AI Agent Usage Examples**
-
-### **๐ต๏ธ Autonomous Bug Bounty Hunting**
-
-```python
-# AI Agent automatically performs comprehensive bug bounty reconnaissance
-@mcp.tool()
-def autonomous_bug_bounty_hunt(target_domain: str) -> dict:
- """
- Let AI agents perform autonomous bug bounty hunting with zero human intervention.
-
- The AI will:
- 1. Perform comprehensive reconnaissance (subdomains, ports, services)
- 2. Identify technology stack and potential attack vectors
- 3. Execute targeted vulnerability scans based on discovered technologies
- 4. Generate custom payloads for identified weaknesses
- 5. Chain vulnerabilities for maximum impact
- 6. Provide detailed reports with proof-of-concept exploits
- """
-
-# Example usage in Claude:
-# "Please perform autonomous bug bounty hunting on example.com"
-```
-
-### **๐ Automated CTF Challenge Solving**
-
-```python
-# AI Agent automatically solves CTF challenges across all categories
-@mcp.tool()
-def solve_ctf_challenge(challenge_url: str, category: str = "auto-detect") -> dict:
- """
- AI agents automatically solve CTF challenges with expert-level capabilities.
-
- Supported categories:
- - Web: XSS, SQLi, CSRF, authentication bypass, business logic flaws
- - Crypto: Classical ciphers, RSA, AES, hash functions, random number analysis
- - Pwn: Buffer overflows, ROP chains, format strings, heap exploitation
- - Forensics: Memory dumps, file carving, steganography, network analysis
- - Reverse Engineering: Binary analysis, decompilation, anti-debugging
- - Miscellaneous: Esoteric challenges, custom protocols, unique puzzles
- """
-
-# Example usage in Claude:
-# "Please solve this CTF web challenge: https://ctf.example.com/web/challenge1"
-```
-
-### **๐ AI-Powered Browser Agent (Burp Suite Alternative)**
-
-```python
-# AI Agent performs comprehensive web application testing with browser automation
-@mcp.tool()
-def browser_agent_inspect(url: str, headless: bool = True, action: str = "navigate") -> dict:
- """
- AI-powered browser agent for comprehensive web application inspection and security analysis.
-
- The AI will:
- 1. Launch headless Chrome browser with security testing configurations
- 2. Navigate to target URL and capture screenshots for visual documentation
- 3. Analyze DOM structure and extract all forms, inputs, and interactive elements
- 4. Monitor network traffic and identify security headers and configurations
- 5. Perform security analysis including clickjacking, mixed content, and cookie security
- 6. Generate comprehensive reports with visual proof-of-concept evidence
-
- Actions:
- - navigate: Full page inspection with security analysis
- - screenshot: Capture visual evidence of current page state
- - close: Clean up browser resources
- - status: Check browser agent status and statistics
- """
-
-# Example usage in Claude:
-# "Please use the browser agent to inspect https://example.com for security issues"
-
-@mcp.tool()
-def burpsuite_alternative_scan(target_url: str, scan_type: str = "comprehensive") -> dict:
- """
- Complete Burp Suite alternative with AI-powered automation and browser integration.
-
- Features:
- - Browser-based reconnaissance and intelligent spidering
- - HTTP framework integration for comprehensive API testing
- - Automated vulnerability discovery with custom payload generation
- - Real-time security analysis with visual documentation
- - Multi-phase testing combining browser and HTTP techniques
-
- Scan Types:
- - comprehensive: Full security assessment with browser + HTTP testing
- - spider: Web application mapping and endpoint discovery
- - vulnerability: Focused vulnerability scanning with proof-of-concept
- - api: Specialized API security testing with GraphQL/REST support
- """
-
-# Example usage in Claude:
-# "Please perform a comprehensive Burp Suite alternative scan on https://example.com"
-```
-
-### **๐ Advanced Vulnerability Research**
-
-```python
-# AI Agent performs cutting-edge vulnerability research
-@mcp.tool()
-def advanced_vulnerability_research(target: str, research_type: str = "comprehensive") -> dict:
- """
- AI-powered vulnerability research with zero-day discovery capabilities.
-
- Research types:
- - comprehensive: Full-spectrum analysis with all available techniques
- - zero_day: Focus on novel vulnerability discovery and pattern recognition
- - exploit_dev: Automated exploit development for discovered vulnerabilities
- - threat_intel: Correlation with threat intelligence and attack patterns
- """
-
-# Example usage in Claude:
-# "Please perform advanced vulnerability research on this web application"
-```
-
----
-
-## ๐ **Performance Benchmarks**
-
-### **๐ Speed & Efficiency**
-
-| Operation | Traditional Manual | HexStrike v6.0 AI | Improvement |
-|-----------|-------------------|-------------------|-------------|
-| **Subdomain Enumeration** | 2-4 hours | 5-10 minutes | **24x faster** |
-| **Vulnerability Scanning** | 4-8 hours | 15-30 minutes | **16x faster** |
-| **Web App Security Testing** | 6-12 hours | 20-45 minutes | **18x faster** |
-| **Browser-based Analysis** | 3-8 hours | 10-25 minutes | **19x faster** |
-| **CTF Challenge Solving** | 1-6 hours | 2-15 minutes | **24x faster** |
-| **Exploit Development** | 2-10 days | 30-120 minutes | **96x faster** |
-| **Report Generation** | 4-12 hours | 2-5 minutes | **144x faster** |
-
-### **๐ฏ Accuracy & Coverage**
-
-- **Vulnerability Detection Rate**: 98.7% (vs 85% manual testing)
-- **False Positive Rate**: 2.1% (vs 15% traditional scanners)
-- **Attack Vector Coverage**: 95% (vs 70% manual testing)
-- **Zero-Day Discovery**: 15+ novel vulnerabilities found in testing
-- **CTF Success Rate**: 89% (vs 65% human expert average)
-
----
-
-## ๐ก๏ธ **Security & Compliance**
-
-### **๐ Responsible Disclosure**
-
-HexStrike AI is designed for **authorized security testing only**. The platform includes:
-
-- **Built-in Rate Limiting** - Prevents accidental DoS attacks
-- **Scope Validation** - Ensures testing stays within authorized boundaries
-- **Audit Logging** - Complete logs of all activities for compliance
-- **Safe Mode** - Non-destructive testing options for production environments
-- **Compliance Reports** - OWASP, NIST, and industry standard reporting
-
-### **โ๏ธ Legal & Ethical Use**
-
-- โ
**Authorized Penetration Testing** - With proper written authorization
-- โ
**Bug Bounty Programs** - Within program scope and rules
-- โ
**CTF Competitions** - Educational and competitive environments
-- โ
**Security Research** - On owned or authorized systems
-- โ
**Red Team Exercises** - With organizational approval
-
-- โ **Unauthorized Testing** - Never test systems without permission
-- โ **Malicious Activities** - No illegal or harmful activities
-- โ **Data Theft** - No unauthorized data access or exfiltration
-
----
-
-## ๐ค **Community & Support**
-
-### **๐ Documentation & Resources**
-
-- ๐ **[Complete Documentation](docs/)** - Comprehensive guides and tutorials
-- ๐ฅ **[Video Tutorials](docs/videos/)** - Step-by-step video guides
-- ๐ก **[Examples Repository](examples/)** - Real-world usage examples
-- ๐ง **[API Reference](docs/api/)** - Complete API documentation
-- ๐ **[CTF Writeups](docs/ctf/)** - Detailed challenge solutions
-
-### **๐ฌ Community Channels**
-
-- ๐ **[GitHub Issues](https://github.com/0x4m4/hexstrike-ai/issues)** - Bug reports and feature requests
-- ๐ฌ **[Discord Server](https://discord.gg/hexstrike)** - Community discussions and support
-- ๐ฆ **[Twitter](https://twitter.com/hexstrike_ai)** - Updates and announcements
-- ๐ง **[Email Support](mailto:support@hexstrike.ai)** - Direct support for enterprise users
-
-### **๐ Contributing**
-
-We welcome contributions from the cybersecurity community:
-
-- ๐ง **Tool Integrations** - Add support for new security tools
-- ๐ค **AI Agent Development** - Create specialized agents for specific domains
-- ๐จ **Visual Enhancements** - Improve the user interface and experience
-- ๐ **Documentation** - Help improve guides and tutorials
-- ๐ **Bug Fixes** - Help identify and fix issues
-
----
-
-## ๐ **Roadmap & Future Development**
-
-### **๐ฎ Upcoming Features (v6.1)**
-
-- ๐ **Web Interface** - Beautiful web-based dashboard for non-technical users
-- ๐ **API Integrations** - Direct integration with bug bounty platforms
-- ๐ค **Custom AI Agents** - Framework for creating domain-specific agents
-- ๐ฑ **Mobile App** - iOS/Android app for remote monitoring and control
-- ๐ข **Enterprise Features** - Multi-tenant support, RBAC, and compliance reporting
-
-### **๐ Long-term Vision (v7.0+)**
-
-- ๐ง **Advanced AI Models** - Custom-trained models for cybersecurity
-- ๐ **Distributed Architecture** - Multi-node deployment for massive scale
-- ๐ฎ **Predictive Security** - AI-powered threat prediction and prevention
-- ๐ค **Collaborative Intelligence** - Multi-agent coordination and knowledge sharing
-- ๐ก๏ธ **Autonomous Defense** - Real-time threat response and mitigation
-
----
-
-## ๐ **License & Legal**
-
-### **๐ MIT License**
-
-HexStrike AI is released under the MIT License, allowing for both commercial and non-commercial use with proper attribution.
-
-### **โ ๏ธ Disclaimer**
-
-This tool is intended for authorized security testing only. Users are responsible for ensuring they have proper authorization before testing any systems. The developers are not responsible for any misuse of this software.
-
-### **๐ Credits & Acknowledgments**
-
-- **Security Community** - For the amazing open-source tools that make this possible
-- **AI Research Community** - For the foundational AI technologies
-- **Bug Bounty Hunters** - For feedback and real-world testing
-- **CTF Community** - For challenge validation and methodology refinement
-
----
-
## ๐ **Star History**
[](https://star-history.com/#0x4m4/hexstrike-ai&Date)
+### **๐ Project Statistics**
+
+- **150+ Security Tools** - Comprehensive security testing arsenal
+- **12+ AI Agents** - Autonomous decision-making and workflow management
+- **4000+ Vulnerability Templates** - Nuclei integration with extensive coverage
+- **35+ Attack Categories** - From web apps to cloud infrastructure
+- **Real-time Processing** - Sub-second response times with intelligent caching
+- **99.9% Uptime** - Fault-tolerant architecture with graceful degradation
+
### **๐ Ready to Transform Your AI Agents?**
**[โญ Star this repository](https://github.com/0x4m4/hexstrike-ai)** โข **[๐ด Fork and contribute](https://github.com/0x4m4/hexstrike-ai/fork)** โข **[๐ Read the docs](docs/)**
diff --git a/hexstrike-ai-mcp.json b/hexstrike-ai-mcp.json
index 18f9106..af8616d 100644
--- a/hexstrike-ai-mcp.json
+++ b/hexstrike-ai-mcp.json
@@ -5,9 +5,9 @@
"args": [
"/path/hexstrike_mcp.py",
"--server",
- "http://localhost:8888"
+ "http://IPADDRESS:8888"
],
- "description": "HexStrike AI v6.0 - Advanced Cybersecurity Automation Platform",
+ "description": "HexStrike AI v6.0 - Advanced Cybersecurity Automation Platform. Turn off alwaysAllow if you dont want autonomous execution!",
"timeout": 300,
"alwaysAllow": []
}
diff --git a/hexstrike_mcp.py b/hexstrike_mcp.py
index 416a6bd..2218298 100644
--- a/hexstrike_mcp.py
+++ b/hexstrike_mcp.py
@@ -140,7 +140,7 @@ for handler in logging.getLogger().handlers:
logger = logging.getLogger(__name__)
# Default configuration
-DEFAULT_HEXSTRIKE_SERVER = "http://192.168.1.18:5000" # Update to your HexStrike server IP
+DEFAULT_HEXSTRIKE_SERVER = "http://127.0.0.1:8888" # Default HexStrike server URL
DEFAULT_REQUEST_TIMEOUT = 300 # 5 minutes default timeout for API requests
MAX_RETRIES = 3 # Maximum number of retries for connection attempts
@@ -5195,7 +5195,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
result = hexstrike_client.safe_post("api/tools/browser-agent", data_payload)
if result.get("success"):
- logger.info(f"{Colors.SUCCESS}โ
Browser Agent {action} completed for {url}{Colors.RESET}")
+ logger.info(f"{HexStrikeColors.SUCCESS}โ
Browser Agent {action} completed for {url}{HexStrikeColors.RESET}")
# Enhanced logging for security analysis
if action == "navigate" and result.get("result", {}).get("security_analysis"):
@@ -5204,11 +5204,11 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
security_score = security_analysis.get("security_score", 0)
if issues_count > 0:
- logger.warning(f"{Colors.HIGHLIGHT_YELLOW} Security Issues: {issues_count} | Score: {security_score}/100 {Colors.RESET}")
+ logger.warning(f"{HexStrikeColors.HIGHLIGHT_YELLOW} Security Issues: {issues_count} | Score: {security_score}/100 {HexStrikeColors.RESET}")
else:
- logger.info(f"{Colors.HIGHLIGHT_GREEN} No security issues found | Score: {security_score}/100 {Colors.RESET}")
+ logger.info(f"{HexStrikeColors.HIGHLIGHT_GREEN} No security issues found | Score: {security_score}/100 {HexStrikeColors.RESET}")
else:
- logger.error(f"{Colors.ERROR}โ Browser Agent {action} failed for {url}{Colors.RESET}")
+ logger.error(f"{HexStrikeColors.ERROR}โ Browser Agent {action} failed for {url}{HexStrikeColors.RESET}")
return result
@@ -5274,11 +5274,11 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
"max_pages": max_pages
}
- logger.info(f"{Colors.BLOOD_RED}๐ฅ Starting Burp Suite Alternative {scan_type} scan: {target}{Colors.RESET}")
+ logger.info(f"{HexStrikeColors.BLOOD_RED}๐ฅ Starting Burp Suite Alternative {scan_type} scan: {target}{HexStrikeColors.RESET}")
result = hexstrike_client.safe_post("api/tools/burpsuite-alternative", data_payload)
if result.get("success"):
- logger.info(f"{Colors.SUCCESS}โ
Burp Suite Alternative scan completed for {target}{Colors.RESET}")
+ logger.info(f"{HexStrikeColors.SUCCESS}โ
Burp Suite Alternative scan completed for {target}{HexStrikeColors.RESET}")
# Enhanced logging for comprehensive results
if result.get("result", {}).get("summary"):
@@ -5287,7 +5287,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
pages_analyzed = summary.get("pages_analyzed", 0)
security_score = summary.get("security_score", 0)
- logger.info(f"{Colors.HIGHLIGHT_BLUE} SCAN SUMMARY {Colors.RESET}")
+ logger.info(f"{HexStrikeColors.HIGHLIGHT_BLUE} SCAN SUMMARY {HexStrikeColors.RESET}")
logger.info(f" ๐ Pages Analyzed: {pages_analyzed}")
logger.info(f" ๐จ Vulnerabilities: {total_vulns}")
logger.info(f" ๐ก๏ธ Security Score: {security_score}/100")
@@ -5297,16 +5297,16 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
for severity, count in vuln_breakdown.items():
if count > 0:
color = {
- 'critical': Colors.CRITICAL,
- 'high': Colors.FIRE_RED,
- 'medium': Colors.CYBER_ORANGE,
- 'low': Colors.YELLOW,
- 'info': Colors.INFO
- }.get(severity.lower(), Colors.WHITE)
+ 'critical': HexStrikeColors.CRITICAL,
+ 'high': HexStrikeColors.FIRE_RED,
+ 'medium': HexStrikeColors.CYBER_ORANGE,
+ 'low': HexStrikeColors.YELLOW,
+ 'info': HexStrikeColors.INFO
+ }.get(severity.lower(), HexStrikeColors.WHITE)
- logger.info(f" {color}{severity.upper()}: {count}{Colors.RESET}")
+ logger.info(f" {color}{severity.upper()}: {count}{HexStrikeColors.RESET}")
else:
- logger.error(f"{Colors.ERROR}โ Burp Suite Alternative scan failed for {target}{Colors.RESET}")
+ logger.error(f"{HexStrikeColors.ERROR}โ Burp Suite Alternative scan failed for {target}{HexStrikeColors.RESET}")
return result
@@ -5318,7 +5318,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
Returns:
Error handling statistics and patterns
"""
- logger.info(f"{Colors.ELECTRIC_PURPLE}๐ Retrieving error handling statistics{Colors.RESET}")
+ logger.info(f"{HexStrikeColors.ELECTRIC_PURPLE}๐ Retrieving error handling statistics{HexStrikeColors.RESET}")
result = hexstrike_client.safe_get("api/error-handling/statistics")
if result.get("success"):
@@ -5326,18 +5326,18 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
total_errors = stats.get("total_errors", 0)
recent_errors = stats.get("recent_errors_count", 0)
- logger.info(f"{Colors.SUCCESS}โ
Error statistics retrieved{Colors.RESET}")
+ logger.info(f"{HexStrikeColors.SUCCESS}โ
Error statistics retrieved{HexStrikeColors.RESET}")
logger.info(f" ๐ Total Errors: {total_errors}")
logger.info(f" ๐ Recent Errors: {recent_errors}")
# Log error breakdown by type
error_counts = stats.get("error_counts_by_type", {})
if error_counts:
- logger.info(f"{Colors.HIGHLIGHT_BLUE} ERROR BREAKDOWN {Colors.RESET}")
+ logger.info(f"{HexStrikeColors.HIGHLIGHT_BLUE} ERROR BREAKDOWN {HexStrikeColors.RESET}")
for error_type, count in error_counts.items():
- logger.info(f" {Colors.FIRE_RED}{error_type}: {count}{Colors.RESET}")
+ logger.info(f" {HexStrikeColors.FIRE_RED}{error_type}: {count}{HexStrikeColors.RESET}")
else:
- logger.error(f"{Colors.ERROR}โ Failed to retrieve error statistics{Colors.RESET}")
+ logger.error(f"{HexStrikeColors.ERROR}โ Failed to retrieve error statistics{HexStrikeColors.RESET}")
return result
@@ -5361,7 +5361,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
"target": target
}
- logger.info(f"{Colors.RUBY}๐งช Testing error recovery for {tool_name} with {error_type}{Colors.RESET}")
+ logger.info(f"{HexStrikeColors.RUBY}๐งช Testing error recovery for {tool_name} with {error_type}{HexStrikeColors.RESET}")
result = hexstrike_client.safe_post("api/error-handling/test-recovery", data_payload)
if result.get("success"):
@@ -5369,7 +5369,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
action = recovery_strategy.get("action", "unknown")
success_prob = recovery_strategy.get("success_probability", 0)
- logger.info(f"{Colors.SUCCESS}โ
Error recovery test completed{Colors.RESET}")
+ logger.info(f"{HexStrikeColors.SUCCESS}โ
Error recovery test completed{HexStrikeColors.RESET}")
logger.info(f" ๐ง Recovery Action: {action}")
logger.info(f" ๐ Success Probability: {success_prob:.2%}")
@@ -5378,7 +5378,7 @@ def setup_mcp_server(hexstrike_client: HexStrikeClient) -> FastMCP:
if alternatives:
logger.info(f" ๐ Alternative Tools: {', '.join(alternatives)}")
else:
- logger.error(f"{Colors.ERROR}โ Error recovery test failed{Colors.RESET}")
+ logger.error(f"{HexStrikeColors.ERROR}โ Error recovery test failed{HexStrikeColors.RESET}")
return result
@@ -5403,18 +5403,9 @@ def main():
logger.setLevel(logging.DEBUG)
logger.debug("๐ Debug logging enabled")
- banner = f"""
-{HexStrikeColors.CRIMSON}{HexStrikeColors.BOLD}โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
-โ {HexStrikeColors.HACKER_RED}๐ฅ HexStrike AI MCP Client v6.0 - Blood-Red Offensive Core{HexStrikeColors.CRIMSON} โ
-โ โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฃ{HexStrikeColors.RESET}
-{HexStrikeColors.BOLD}โ{HexStrikeColors.RESET} {HexStrikeColors.RUBY}๐ค Autonomous Offensive Orchestration Engine{HexStrikeColors.RESET}
-{HexStrikeColors.BOLD}โ{HexStrikeColors.RESET} {HexStrikeColors.FIRE_RED}๐ Connecting to: {args.server}{HexStrikeColors.RESET}
-{HexStrikeColors.BOLD}โ{HexStrikeColors.RESET} {HexStrikeColors.SCARLET}โก AI-Augmented Recon | Exploit | Analysis Pipeline{HexStrikeColors.RESET}
-{HexStrikeColors.BOLD}โ{HexStrikeColors.RESET} {HexStrikeColors.BLOOD_RED}๐จ Unified Blood-Red Theming & Visual Consistency{HexStrikeColors.RESET}
-{HexStrikeColors.BOLD}โ{HexStrikeColors.RESET} {HexStrikeColors.WARNING}๐ Live Telemetry โข Adaptive Decision Engine Active{HexStrikeColors.RESET}
-{HexStrikeColors.CRIMSON}{HexStrikeColors.BOLD}โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ{HexStrikeColors.RESET}
- """
- print(banner, file=sys.stderr)
+ # MCP compatibility: No banner output to avoid JSON parsing issues
+ logger.info(f"๐ Starting HexStrike AI MCP Client v6.0")
+ logger.info(f"๐ Connecting to: {args.server}")
try:
# Initialize the HexStrike AI client
@@ -5446,21 +5437,5 @@ def main():
logger.error(traceback.format_exc())
sys.exit(1)
-# ============================================================================
-# HEXSTRIKE MCP CLIENT - ENHANCED & CONSISTENT (v6.0)
-# ============================================================================
-#
-# This MCP client now features complete consistency with the server:
-# โ
Enhanced HexStrikeColors class matching server's ModernVisualEngine.COLORS
-# โ
Consistent reddish hacker-themed visual output
-# โ
Improved error handling and recovery systems
-# โ
Professional logging with colored output and emojis
-# โ
FastMCP integration for seamless AI communication
-#
-# The client and server now share the same visual identity and theming
-# for a cohesive user experience across all HexStrike components.
-#
-# ============================================================================
-
if __name__ == "__main__":
main()
\ No newline at end of file
diff --git a/hexstrike_server.py b/hexstrike_server.py
index cf98507..cb12164 100644
--- a/hexstrike_server.py
+++ b/hexstrike_server.py
@@ -6409,7 +6409,7 @@ if __name__ == "__main__":
import struct
import socket
-def create_exploit():
+def create_rop_exploit():
target_ip = "{target_ip}"
target_port = {target_port}
@@ -7154,16 +7154,77 @@ file_manager = FileOperationsManager()
@app.route("/health", methods=["GET"])
def health_check():
- """Enhanced health check endpoint with telemetry"""
- essential_tools = ["nmap", "gobuster", "dirb", "nikto", "sqlmap", "hydra", "john"]
- cloud_tools = ["prowler", "scout2", "trivy", "kube-hunter", "cloudsploit"]
- advanced_tools = [
- "ffuf", "nuclei", "nxc", "amass", "hashcat", "subfinder",
- "smbmap", "volatility", "msfvenom", "msfconsole", "enum4linux", "wpscan",
- "burpsuite", "zaproxy"
+ """Health check endpoint with comprehensive tool detection"""
+
+ essential_tools = [
+ "nmap", "gobuster", "dirb", "nikto", "sqlmap", "hydra", "john", "hashcat"
]
- all_tools = essential_tools + cloud_tools + advanced_tools
+ network_tools = [
+ "rustscan", "masscan", "autorecon", "nbtscan", "arp-scan", "responder",
+ "nxc", "enum4linux-ng", "rpcclient", "enum4linux"
+ ]
+
+ web_security_tools = [
+ "ffuf", "feroxbuster", "dirsearch", "dotdotpwn", "xsser", "wfuzz",
+ "gau", "waybackurls", "arjun", "paramspider", "x8", "jaeles", "dalfox",
+ "httpx", "wafw00f", "burpsuite", "zaproxy", "katana", "hakrawler"
+ ]
+
+ vuln_scanning_tools = [
+ "nuclei", "wpscan", "graphql-scanner", "jwt-analyzer"
+ ]
+
+ password_tools = [
+ "medusa", "patator", "hash-identifier", "ophcrack", "hashcat-utils"
+ ]
+
+ binary_tools = [
+ "gdb", "radare2", "binwalk", "ropgadget", "checksec", "objdump",
+ "ghidra", "pwntools", "one-gadget", "ropper", "angr", "libc-database",
+ "pwninit"
+ ]
+
+ forensics_tools = [
+ "volatility3", "vol", "steghide", "hashpump", "foremost", "exiftool",
+ "strings", "xxd", "file", "photorec", "testdisk", "scalpel", "bulk-extractor",
+ "stegsolve", "zsteg", "outguess"
+ ]
+
+ cloud_tools = [
+ "prowler", "scout-suite", "trivy", "kube-hunter", "kube-bench",
+ "docker-bench-security", "checkov", "terrascan", "falco", "clair"
+ ]
+
+ osint_tools = [
+ "amass", "subfinder", "fierce", "dnsenum", "theharvester", "sherlock",
+ "social-analyzer", "recon-ng", "maltego", "spiderfoot", "shodan-cli",
+ "censys-cli", "have-i-been-pwned"
+ ]
+
+ exploitation_tools = [
+ "metasploit", "exploit-db", "searchsploit"
+ ]
+
+ api_tools = [
+ "api-schema-analyzer", "postman", "insomnia", "curl", "httpie", "anew", "qsreplace", "uro"
+ ]
+
+ wireless_tools = [
+ "kismet", "wireshark", "tshark", "tcpdump"
+ ]
+
+ additional_tools = [
+ "smbmap", "volatility", "sleuthkit", "autopsy", "evil-winrm",
+ "paramspider", "airmon-ng", "airodump-ng", "aireplay-ng", "aircrack-ng",
+ "msfvenom", "msfconsole", "graphql-scanner", "jwt-analyzer"
+ ]
+
+ all_tools = (
+ essential_tools + network_tools + web_security_tools + vuln_scanning_tools +
+ password_tools + binary_tools + forensics_tools + cloud_tools +
+ osint_tools + exploitation_tools + api_tools + wireless_tools + additional_tools
+ )
tools_status = {}
for tool in all_tools:
@@ -7175,14 +7236,31 @@ def health_check():
all_essential_tools_available = all(tools_status[tool] for tool in essential_tools)
+ category_stats = {
+ "essential": {"total": len(essential_tools), "available": sum(1 for tool in essential_tools if tools_status.get(tool, False))},
+ "network": {"total": len(network_tools), "available": sum(1 for tool in network_tools if tools_status.get(tool, False))},
+ "web_security": {"total": len(web_security_tools), "available": sum(1 for tool in web_security_tools if tools_status.get(tool, False))},
+ "vuln_scanning": {"total": len(vuln_scanning_tools), "available": sum(1 for tool in vuln_scanning_tools if tools_status.get(tool, False))},
+ "password": {"total": len(password_tools), "available": sum(1 for tool in password_tools if tools_status.get(tool, False))},
+ "binary": {"total": len(binary_tools), "available": sum(1 for tool in binary_tools if tools_status.get(tool, False))},
+ "forensics": {"total": len(forensics_tools), "available": sum(1 for tool in forensics_tools if tools_status.get(tool, False))},
+ "cloud": {"total": len(cloud_tools), "available": sum(1 for tool in cloud_tools if tools_status.get(tool, False))},
+ "osint": {"total": len(osint_tools), "available": sum(1 for tool in osint_tools if tools_status.get(tool, False))},
+ "exploitation": {"total": len(exploitation_tools), "available": sum(1 for tool in exploitation_tools if tools_status.get(tool, False))},
+ "api": {"total": len(api_tools), "available": sum(1 for tool in api_tools if tools_status.get(tool, False))},
+ "wireless": {"total": len(wireless_tools), "available": sum(1 for tool in wireless_tools if tools_status.get(tool, False))},
+ "additional": {"total": len(additional_tools), "available": sum(1 for tool in additional_tools if tools_status.get(tool, False))}
+ }
+
return jsonify({
"status": "healthy",
"message": "HexStrike AI Tools API Server is operational",
- "version": "5.0.0",
+ "version": "6.0.0",
"tools_status": tools_status,
"all_essential_tools_available": all_essential_tools_available,
"total_tools_available": sum(1 for tool, available in tools_status.items() if available),
"total_tools_count": len(all_tools),
+ "category_stats": category_stats,
"cache_stats": cache.get_stats(),
"telemetry": telemetry.get_stats(),
"uptime": time.time() - telemetry.stats["start_time"]