42 KiB
HexStrike AI Agents v5.0
The Ultimate AI-Powered Cybersecurity Automation Platform
Revolutionary AI-Driven Cybersecurity Framework for Penetration Testing, Bug Bounty Hunting, CTF Challenges, and Security Research
🚀 Quick Start • 📚 Documentation • 🛠️ Features • 💡 Examples • 🤝 Contributing • ⭐ Star Us
Why Choose HexStrike AI Agents v5.0?
HexStrike AI is the most advanced open-source cybersecurity automation platform that revolutionizes security testing by combining traditional penetration testing tools with cutting-edge artificial intelligence. Trusted by security professionals, researchers, and ethical hackers worldwide.
🎯 Perfect For:
- 🔍 Penetration Testers - Automate reconnaissance and vulnerability discovery
- 💰 Bug Bounty Hunters - Accelerate target analysis and exploit development
- 🏆 CTF Players - Advanced forensics, crypto, and reversing capabilities
- 🔬 Security Researchers - AI-powered payload generation and testing
- 🎖️ Red Team Operators - Comprehensive attack surface analysis
- 📚 Security Students - Learning platform with real-world tools
Key Highlights
| 🎯 70+ Security Tools | 🤖 AI-Powered Intelligence | ⚡ 50% Performance Boost |
|---|---|---|
| Complete penetration testing arsenal | Contextual payload generation & analysis | Advanced caching & optimization |
| 🎮 Real-time Control | 🌐 Modern API Testing | 🔧 Professional Integration |
|---|---|---|
| Command termination & progress tracking | GraphQL, JWT, REST API security | MCP, Roo Code, Claude integration |
✨ What Makes Us Special:
- 🔥 Zero Server Restart - Terminate long-running scans without interruption
- 🎨 Beautiful Real-time Output - Progress bars, ETA calculations, visual status
- 🧠 AI Contextual Payloads - Technology-specific exploit generation
- 📊 Live Dashboard - Monitor all processes with system metrics
- 🔄 Smart Caching - 50% faster repeated operations
- 🛡️ Comprehensive Coverage - Network, web, binary, cloud, CTF tools
Comprehensive Feature Set
🎯 Core Security Tools (70+)
🔍 Network Reconnaissance & Scanning
- Nmap - Advanced port scanning with custom NSE scripts
- Amass - Comprehensive subdomain enumeration and OSINT
- Subfinder - Fast passive subdomain discovery
- Nuclei - Fast vulnerability scanner with 4000+ templates
- AutoRecon - Automated reconnaissance with 35+ parameters
- Fierce - DNS reconnaissance and zone transfer testing
- Masscan - High-speed Internet-scale port scanner
🌐 Web Application Security Testing
- Gobuster - Directory, file, and DNS enumeration
- FFuf - Fast web fuzzer with advanced filtering capabilities
- Dirb - Comprehensive web content scanner
- Nikto - Web server vulnerability scanner
- SQLMap - Advanced automatic SQL injection testing
- WPScan - WordPress security scanner with vulnerability database
- Burp Suite - Professional web security testing platform
- OWASP ZAP - Web application security scanner
- Arjun - HTTP parameter discovery tool
- Wafw00f - Web application firewall fingerprinting
- Feroxbuster - Fast content discovery tool
- Dotdotpwn - Directory traversal fuzzer
- XSSer - Cross-site scripting detection and exploitation
- Wfuzz - Web application fuzzer
🔐 Authentication & Password Security
- Hydra - Network login cracker supporting 50+ protocols
- John the Ripper - Advanced password hash cracking
- Hashcat - World's fastest password recovery tool
- Medusa - Speedy, parallel, modular login brute-forcer
- Patator - Multi-purpose brute-forcer
- CrackMapExec - Swiss army knife for pentesting networks
- Evil-WinRM - Windows Remote Management shell
🔬 Binary Analysis & Reverse Engineering
- GDB - GNU Debugger with Python scripting
- Radare2 - Advanced reverse engineering framework
- Binwalk - Firmware analysis and extraction tool
- ROPgadget - ROP/JOP gadget finder
- Checksec - Binary security property checker
- Strings - Extract printable strings from binaries
- Objdump - Display object file information
- Ghidra - NSA's software reverse engineering suite
- XXD - Hex dump utility
🏆 Advanced CTF & Forensics Tools
- Volatility3 - Advanced memory forensics framework
- Foremost - File carving and data recovery
- Steghide - Steganography detection and extraction
- ExifTool - Metadata reader/writer for various file formats
- HashPump - Hash length extension attack tool
- Binwalk - Firmware analysis and reverse engineering
- Autopsy - Digital forensics platform
- Sleuth Kit - Collection of command-line digital forensics tools
☁️ Cloud & Container Security
- Prowler - AWS/Azure/GCP security assessment tool
- Trivy - Comprehensive vulnerability scanner for containers
- Scout Suite - Multi-cloud security auditing tool
- Kube-Hunter - Kubernetes penetration testing tool
- Kube-Bench - CIS Kubernetes benchmark checker
- CloudSploit - Cloud security scanning and monitoring
🔥 Bug Bounty & Reconnaissance Arsenal
- Hakrawler - Fast web endpoint discovery and crawling
- HTTPx - Fast and multi-purpose HTTP toolkit
- ParamSpider - Mining parameters from dark corners of web archives
- Aquatone - Visual inspection of websites across hosts
- Subjack - Subdomain takeover vulnerability checker
- DNSENUM - DNS enumeration script
- Fierce - Domain scanner for locating targets
🤖 AI-Powered Intelligence System
🎯 Contextual Payload Generation
Smart Attack Vector Creation:
- XSS Payloads - Basic, advanced, filter bypass techniques
- SQL Injection - Database-specific, blind, time-based attacks
- Command Injection - OS-specific, blind execution techniques
- LFI/RFI - Local/remote file inclusion with wrapper techniques
- SSTI - Server-side template injection for various engines
- XXE - XML external entity attacks with data exfiltration
- CSRF - Cross-site request forgery payload generation
Features:
- 🧠 Technology Detection - Automatic context adaptation
- 🎯 Risk Assessment - Automatic payload severity rating
- 🔄 Encoding Variations - URL, HTML, Unicode encoding
- 📊 Success Probability - AI-calculated effectiveness scores
🧪 Automated Vulnerability Testing
- Intelligent Test Cases - AI-guided vulnerability assessment
- Response Analysis - Automated vulnerability confirmation
- False Positive Reduction - Smart filtering and validation
- Comprehensive Reports - Detailed security assessments
- Attack Chaining - Multi-stage exploit development
🌐 Advanced API Security Testing
- GraphQL Security - Introspection, depth limiting, batch query testing
- JWT Analysis - Algorithm confusion, signature bypass, token manipulation
- REST API Testing - Endpoint discovery, parameter fuzzing, authentication bypass
- API Schema Analysis - OpenAPI/Swagger security assessment
- Comprehensive Audits - Multi-technique API penetration testing
⚡ Performance & Control Features
🎮 Real-time Process Management
Advanced Command Control:
- Live Termination - Stop scans without server restart
- Progress Tracking - Real-time progress bars with ETA calculations
- Process Dashboard - Monitor all active scans simultaneously
- Resource Management - CPU and memory optimization
- Pause/Resume - Full control over long-running operations
Visual Progress Display:
⚡ PROGRESS ⣷ [████████████░░░░░░░░] 60.5% | 12.3s | ETA: 8s | PID: 87369
📊 FINAL RESULTS ✅
├─ Command: nmap -sV -sC example.com
├─ Duration: 15.2s
├─ Output Size: 2847 bytes
├─ Exit Code: 0
└─ Status: SUCCESS | Cached: Yes
🚀 Intelligent Caching System
- 50% Performance Boost - Smart result caching with LRU eviction
- Context-Aware TTL - Dynamic cache expiration based on command type
- Hit Rate Optimization - Statistical analysis and cache tuning
- Memory Management - Configurable cache size and cleanup
- Cache Analytics - Detailed performance metrics
📊 Enhanced Logging & Monitoring
- Color-Coded Output - Visual command execution status
- Structured Logging - JSON-formatted audit trails
- Performance Metrics - Real-time system resource monitoring
- Security Analytics - Vulnerability discovery statistics
- Export Capabilities - Multiple output formats (JSON, XML, CSV)
Quick Installation
📋 System Requirements
# Recommended Environment
OS: Kali Linux 2023.1+ / Ubuntu 20.04+ / Debian 11+
Python: 3.8+ with pip
RAM: 4GB+ (8GB recommended)
Storage: 20GB+ free space
Network: High-speed internet for tool updates
🛠️ Manual Installation
# 1. Clone the repository
git clone https://github.com/0x4m4/hexstrike-ai.git
cd hexstrike-ai
# 2. Install Python dependencies
pip3 install -r requirements.txt
# 3. Start HexStrike AI Server
python3 hexstrike_server.py
# 4. Verify installation
curl http://localhost:5000/health
# 5. Attach the MCP JSON Configuration with your desired AI and run it
🛡️ Required Kali Linux Tools
The following security tools need to be installed on your Kali Linux system:
# Install required security tools (Complete list of all tools)
sudo apt update && sudo apt install -y \
nmap amass subfinder nuclei autorecon fierce masscan \
gobuster ffuf dirb nikto sqlmap wpscan burpsuite zaproxy \
arjun wafw00f feroxbuster dotdotpwn xsser wfuzz \
hydra john hashcat medusa patator crackmapexec evil-winrm \
gdb radare2 binwalk ropgadget checksec ghidra xxd \
volatility3 foremost steghide exiftool hashpump autopsy sleuthkit \
prowler trivy scout-suite kube-hunter kube-bench cloudsploit \
hakrawler httpx paramspider aquatone subjack dnsenum
Complete Tool List:
🔍 Network Reconnaissance & Scanning:
- nmap, amass, subfinder, nuclei, autorecon, fierce, masscan
🌐 Web Application Security Testing:
- gobuster, ffuf, dirb, nikto, sqlmap, wpscan, burpsuite, zaproxy, arjun, wafw00f, feroxbuster, dotdotpwn, xsser, wfuzz
🔐 Authentication & Password Security:
- hydra, john, hashcat, medusa, patator, crackmapexec, evil-winrm
🔬 Binary Analysis & Reverse Engineering:
- gdb, radare2, binwalk, ropgadget, checksec, ghidra, xxd, strings, objdump
🏆 Advanced CTF & Forensics Tools:
- volatility3, foremost, steghide, exiftool, hashpump, autopsy, sleuthkit
☁️ Cloud & Container Security:
- prowler, trivy, scout-suite, kube-hunter, kube-bench, cloudsploit
🔥 Bug Bounty & Reconnaissance Arsenal:
- hakrawler, httpx, paramspider, aquatone, subjack, dnsenum, fierce
🐳 Docker Deployment (Coming Soon)
# Docker support will be available in the next release
# Stay tuned for containerized deployment options
🌐 Cloud Deployment (Updating SOON!)
AWS EC2 Deployment
# Launch EC2 instance with security group allowing port 5000
aws ec2 run-instances \
--image-id ami-0abcdef1234567890 \
--instance-type t3.medium \
--key-name your-key-pair \
--security-groups hexstrike-sg
# SSH and install
ssh -i your-key.pem ubuntu@your-ec2-ip
git clone https://github.com/0x4m4/hexstrike-ai.git
cd hexstrike-ai && ./install.sh
AI Integration Setup
Roo Code Integration
Complete Roo Code Setup Guide
Step 1: Install Roo Code
# Download from roo.dev and install
curl -sSL https://install.roo.dev | bash
Step 2: Configure MCP Settings
Create/edit ~/.config/roo/mcp-settings.json:
{
"mcpServers": {
"hexstrike-ai": {
"command": "python3",
"args": [
"/path/hexstrike_mcp.py",
"--server",
"http://localhost:5000"
],
"description": "HexStrike AI v5.0 - Advanced Cybersecurity Automation Platform",
"timeout": 300,
"alwaysAllow": []
}
}
}
Step 3: Start Services
# Terminal 1: Start HexStrike Server
python3 hexstrike_server.py
# Terminal 2: Start Roo Code
roo-code
# Test integration in Roo Code:
# "Scan example.com with nmap and analyze the results"
Claude Desktop Integration
Claude MCP Configuration
Configure Claude Desktop:
Edit ~/.config/Claude/claude_desktop_config.json:
{
"mcpServers": {
"hexstrike-ai": {
"command": "python3",
"args": [
"/path/to/hexstrike-ai/hexstrike_mcp.py",
"--server", "http://localhost:5000"
],
"env": {
"HEXSTRIKE_SERVER": "http://localhost:5000"
}
}
}
}
Usage in Claude:
# Example prompts:
"Perform a comprehensive security scan of example.com"
"Generate XSS payloads for a PHP application"
"Analyze this JWT token for vulnerabilities"
"Start a bug bounty reconnaissance on target.com"
VS Code Copilot Integration
VS Code MCP Configuration
Step 1: Install VS Code Copilot Extension
# Install VS Code Copilot extension from marketplace
# or use command line
code --install-extension GitHub.copilot
Step 2: Configure MCP Settings
Create/edit VS Code settings file ~/.vscode/settings.json or workspace .vscode/settings.json:
{
"mcp.servers": {
"hexstrike-ai": {
"command": "python3",
"args": [
"/path/to/hexstrike-ai/hexstrike_mcp.py",
"--server",
"http://localhost:5000"
],
"description": "HexStrike AI v5.0 - Advanced Cybersecurity Automation Platform"
}
}
}
Step 3: Start Services and Use
# Terminal 1: Start HexStrike Server
python3 hexstrike_server.py
# Open VS Code and use Copilot with prompts like:
# "Use HexStrike AI to scan example.com with nmap"
# "Generate XSS payloads for testing with HexStrike AI"
# "Perform vulnerability assessment on target.com using HexStrike tools"
Usage Examples in VS Code:
// In VS Code with Copilot, use these prompts:
// @hexstrike-ai scan example.com with comprehensive nmap scan
// @hexstrike-ai generate SQL injection payloads for MySQL
// @hexstrike-ai perform subdomain enumeration on target.com
// @hexstrike-ai analyze JWT token vulnerabilities
Cursor AI Integration
Cursor MCP Setup Guide
Step 1: Install Cursor
# Download from cursor.sh and install
# Or use package manager
curl -fsSL https://cursor.sh/install.sh | sh
Step 2: Configure MCP Settings
Create/edit Cursor settings file ~/.cursor/mcp_settings.json:
{
"mcpServers": {
"hexstrike-ai": {
"command": "python3",
"args": [
"/path/to/hexstrike-ai/hexstrike_mcp.py",
"--server",
"http://localhost:5000"
],
"description": "HexStrike AI v5.0 - Advanced Cybersecurity Automation Platform"
}
}
}
Step 3: Start Services
# Terminal 1: Start HexStrike Server
python3 hexstrike_server.py
# Terminal 2: Start Cursor
cursor
# Test integration in Cursor chat:
# "Use HexStrike AI to perform penetration testing on example.com"
# "Generate advanced payloads for web application testing"
Usage in Cursor:
# Example prompts in Cursor AI chat:
"Scan example.com using HexStrike AI nmap integration with service detection"
"Use HexStrike AI to enumerate subdomains for target.com"
"Generate contextual XSS payloads using HexStrike AI for React application"
"Perform comprehensive vulnerability assessment using HexStrike AI tools"
"Analyze API security using HexStrike AI JWT and GraphQL tools"
Advanced Cursor Integration:
# For advanced users, add to Cursor workspace settings:
{
"hexstrike.integration": {
"autoConnect": true,
"serverUrl": "http://localhost:5000",
"defaultTools": ["nmap", "nuclei", "amass", "gobuster"],
"aiPayloadGeneration": true
}
}
Custom AI Integration
Build Your Own Integration
# Custom AI client example
import requests
class HexStrikeAI:
def __init__(self, base_url="http://localhost:5000"):
self.base_url = base_url
def security_scan(self, target, scan_type="comprehensive"):
"""Perform automated security scanning"""
if scan_type == "comprehensive":
# Network scan
nmap_result = self.nmap_scan(target)
# Web scan
web_result = self.web_scan(target)
# Vulnerability scan
vuln_result = self.vulnerability_scan(target)
return {
"network": nmap_result,
"web": web_result,
"vulnerabilities": vuln_result
}
def ai_payload_generation(self, attack_type, target_tech):
"""Generate contextual security payloads"""
response = requests.post(f"{self.base_url}/api/ai/generate_payload",
json={
"attack_type": attack_type,
"technology": target_tech,
"complexity": "advanced"
})
return response.json()
# Usage
ai = HexStrikeAI()
results = ai.security_scan("example.com")
payloads = ai.ai_payload_generation("xss", "php")
Usage Examples
🎯 Basic Security Scanning
Network Reconnaissance Workflow
import requests
# 1. Advanced Nmap scan with service detection
nmap_data = {
"target": "example.com",
"scan_type": "-sV -sC",
"ports": "1-10000",
"additional_args": "-T4 --script vuln"
}
nmap_result = requests.post("http://localhost:5000/api/tools/nmap", json=nmap_data)
# 2. Subdomain enumeration with Amass
amass_data = {
"domain": "example.com",
"mode": "enum",
"additional_args": "-active -brute -w /usr/share/wordlists/subdomains.txt"
}
amass_result = requests.post("http://localhost:5000/api/tools/amass", json=amass_data)
# 3. Nuclei vulnerability scanning
nuclei_data = {
"target": "https://example.com",
"severity": "high,critical",
"additional_args": "-rl 100"
}
nuclei_result = requests.post("http://localhost:5000/api/tools/nuclei", json=nuclei_data)
Web Application Security Testing
# Directory enumeration with Gobuster
gobuster_data = {
"url": "https://example.com",
"mode": "dir",
"wordlist": "/usr/share/wordlists/dirb/big.txt",
"additional_args": "-x php,html,js,txt -t 50 -k"
}
gobuster_result = requests.post("http://localhost:5000/api/tools/gobuster", json=gobuster_data)
# SQL injection testing with SQLMap
sqlmap_data = {
"url": "https://example.com/login.php",
"data": "username=admin&password=test",
"additional_args": "--batch --level 3 --risk 2 --dbs"
}
sqlmap_result = requests.post("http://localhost:5000/api/tools/sqlmap", json=sqlmap_data)
# Web application scanning with Nikto
nikto_data = {
"host": "https://example.com",
"additional_args": "-ssl -Display V"
}
nikto_result = requests.post("http://localhost:5000/api/tools/nikto", json=nikto_data)
🤖 AI-Powered Security Testing
Intelligent Payload Generation
# Generate contextual XSS payloads for PHP application
xss_payload_data = {
"attack_type": "xss",
"complexity": "advanced",
"technology": "php",
"url": "https://vulnerable-app.com/search.php"
}
xss_payloads = requests.post("http://localhost:5000/api/ai/generate_payload", json=xss_payload_data)
# Generate SQL injection payloads for MySQL
sqli_payload_data = {
"attack_type": "sqli",
"complexity": "time_based",
"technology": "mysql",
"url": "https://vulnerable-app.com/login.php"
}
sqli_payloads = requests.post("http://localhost:5000/api/ai/generate_payload", json=sqli_payload_data)
# Comprehensive attack suite generation
attack_suite_data = {
"target_url": "https://api.example.com",
"attack_types": "xss,sqli,lfi,ssti,xxe"
}
attack_suite = requests.post("http://localhost:5000/api/ai/generate_attack_suite", json=attack_suite_data)
Advanced API Security Testing
# GraphQL security assessment
graphql_data = {
"endpoint": "https://api.example.com/graphql",
"introspection": True,
"query_depth": 15,
"test_mutations": True
}
graphql_result = requests.post("http://localhost:5000/api/tools/graphql_scanner", json=graphql_data)
# JWT token comprehensive analysis
jwt_data = {
"jwt_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c",
"target_url": "https://api.example.com/protected"
}
jwt_result = requests.post("http://localhost:5000/api/tools/jwt_analyzer", json=jwt_data)
# API schema security analysis
schema_data = {
"schema_url": "https://api.example.com/swagger.json",
"schema_type": "openapi"
}
schema_result = requests.post("http://localhost:5000/api/tools/api_schema_analyzer", json=schema_data)
# Comprehensive API security audit
api_audit_data = {
"base_url": "https://api.example.com",
"schema_url": "https://api.example.com/swagger.json",
"jwt_token": "eyJhbGciOiJIUzI1NiI...",
"graphql_endpoint": "https://api.example.com/graphql"
}
audit_result = requests.post("http://localhost:5000/api/tools/comprehensive_api_audit", json=api_audit_data)
🎮 Real-time Process Management
Command Control & Monitoring
# List all active processes with detailed information
processes = requests.get("http://localhost:5000/api/processes/list")
print(f"Active processes: {processes.json()['total_count']}")
# Get comprehensive process dashboard
dashboard = requests.get("http://localhost:5000/api/processes/dashboard")
for process in dashboard.json()['processes']:
print(f"PID {process['pid']}: {process['progress_bar']} {process['progress_percent']}")
# Terminate a long-running scan that's stuck
terminate_result = requests.post("http://localhost:5000/api/processes/terminate/12345")
# Pause and resume processes for resource management
pause_result = requests.post("http://localhost:5000/api/processes/pause/12345")
resume_result = requests.post("http://localhost:5000/api/processes/resume/12345")
# Monitor specific process status
status = requests.get("http://localhost:5000/api/processes/status/12345")
print(f"Process status: {status.json()['process']['status']}")
🏆 CTF & Digital Forensics
Advanced Analysis Workflow
# Memory forensics with Volatility3
volatility_data = {
"memory_file": "/tmp/challenge.dump",
"plugin": "windows.pslist",
"additional_args": "--output-file /tmp/processes.txt"
}
vol_result = requests.post("http://localhost:5000/api/tools/volatility3", json=volatility_data)
# File carving with Foremost
foremost_data = {
"input_file": "/tmp/disk.img",
"output_dir": "/tmp/carved_files",
"file_types": "jpg,png,pdf,doc,zip"
}
foremost_result = requests.post("http://localhost:5000/api/tools/foremost", json=foremost_data)
# Steganography analysis
steghide_data = {
"action": "extract",
"cover_file": "/tmp/suspicious_image.jpg",
"passphrase": "secret123",
"output_file": "/tmp/hidden_data.txt"
}
steg_result = requests.post("http://localhost:5000/api/tools/steghide", json=steghide_data)
# Metadata extraction
exiftool_data = {
"file_path": "/tmp/evidence.jpg",
"output_format": "json"
}
exif_result = requests.post("http://localhost:5000/api/tools/exiftool", json=exiftool_data)
🏢 Enterprise Bug Bounty Workflow
Complete Reconnaissance Pipeline
#!/bin/bash
# Automated bug bounty reconnaissance script
TARGET="example.com"
API_BASE="http://localhost:5000"
echo "🎯 Starting comprehensive reconnaissance for $TARGET"
# 1. Subdomain Discovery
echo "📡 Phase 1: Subdomain enumeration"
curl -s -X POST "$API_BASE/api/tools/amass" \
-H "Content-Type: application/json" \
-d "{\"domain\": \"$TARGET\", \"mode\": \"enum\"}" | jq .
# 2. HTTP probing
echo "🌐 Phase 2: HTTP service discovery"
curl -s -X POST "$API_BASE/api/tools/httpx" \
-H "Content-Type: application/json" \
-d "{\"targets\": \"$TARGET\", \"methods\": \"GET,POST\"}" | jq .
# 3. Web crawling
echo "🕷️ Phase 3: Web endpoint discovery"
curl -s -X POST "$API_BASE/api/tools/hakrawler" \
-H "Content-Type: application/json" \
-d "{\"url\": \"https://$TARGET\", \"depth\": 3}" | jq .
# 4. Vulnerability scanning
echo "🔍 Phase 4: Vulnerability assessment"
curl -s -X POST "$API_BASE/api/tools/nuclei" \
-H "Content-Type: application/json" \
-d "{\"target\": \"https://$TARGET\", \"severity\": \"high,critical\"}" | jq .
# 5. AI-powered payload testing
echo "🤖 Phase 5: AI payload generation"
curl -s -X POST "$API_BASE/api/ai/generate_attack_suite" \
-H "Content-Type: application/json" \
-d "{\"target_url\": \"https://$TARGET\", \"attack_types\": \"xss,sqli,lfi\"}" | jq .
echo "✅ Reconnaissance complete!"
API Reference
🔧 Core System Endpoints
| Endpoint | Method | Description | Parameters |
|---|---|---|---|
/health |
GET | Server health check | None |
/api/command |
POST | Execute arbitrary commands | command, use_cache |
/api/telemetry |
GET | System performance metrics | None |
/api/cache/stats |
GET | Cache performance statistics | None |
/api/cache/clear |
POST | Clear system cache | None |
🛡️ Security Tools API
Network Security Tools
| Tool | Endpoint | Key Parameters |
|---|---|---|
| Nmap | /api/tools/nmap |
target, scan_type, ports, additional_args |
| Amass | /api/tools/amass |
domain, mode, additional_args |
| Subfinder | /api/tools/subfinder |
domain, silent, additional_args |
| Nuclei | /api/tools/nuclei |
target, severity, additional_args |
| AutoRecon | /api/tools/autorecon |
target, additional_args |
Web Application Security
| Tool | Endpoint | Key Parameters |
|---|---|---|
| Gobuster | /api/tools/gobuster |
url, mode, wordlist, additional_args |
| SQLMap | /api/tools/sqlmap |
url, data, additional_args |
| Nikto | /api/tools/nikto |
host, additional_args |
| WPScan | /api/tools/wpscan |
url, additional_args |
| FFuf | /api/tools/ffuf |
url, wordlist, additional_args |
Advanced API Testing
| Tool | Endpoint | Key Parameters |
|---|---|---|
| GraphQL Scanner | /api/tools/graphql_scanner |
endpoint, introspection, query_depth |
| JWT Analyzer | /api/tools/jwt_analyzer |
jwt_token, target_url |
| API Fuzzer | /api/tools/api_fuzzer |
base_url, endpoints, methods |
| Schema Analyzer | /api/tools/api_schema_analyzer |
schema_url, schema_type |
🤖 AI-Powered Features
Intelligent Security Testing
| Feature | Endpoint | Key Parameters |
|---|---|---|
| Payload Generation | /api/ai/generate_payload |
attack_type, complexity, technology |
| Payload Testing | /api/ai/test_payload |
payload, target_url, method |
| Attack Suite | /api/ai/generate_attack_suite |
target_url, attack_types |
🎮 Process Management
Real-time Command Control
| Action | Endpoint | Description |
|---|---|---|
| List Processes | GET /api/processes/list |
List all active processes |
| Process Status | GET /api/processes/status/<pid> |
Get detailed process information |
| Terminate | POST /api/processes/terminate/<pid> |
Stop specific process |
| Pause | POST /api/processes/pause/<pid> |
Pause running process |
| Resume | POST /api/processes/resume/<pid> |
Resume paused process |
| Dashboard | GET /api/processes/dashboard |
Live monitoring dashboard |
Advanced Use Cases
🎯 Enterprise Security Assessment
Complete Infrastructure Audit
class EnterpriseSecurityAudit:
def __init__(self, base_url="http://localhost:5000"):
self.api = base_url
def comprehensive_assessment(self, target_scope):
"""Complete enterprise security assessment"""
results = {
"scope": target_scope,
"findings": {},
"risk_rating": "UNKNOWN"
}
# Phase 1: Network Discovery
network_results = self.network_discovery(target_scope)
results["findings"]["network"] = network_results
# Phase 2: Web Application Testing
web_results = self.web_app_testing(target_scope)
results["findings"]["web_applications"] = web_results
# Phase 3: API Security Assessment
api_results = self.api_security_testing(target_scope)
results["findings"]["api_security"] = api_results
# Phase 4: Cloud Security Review
cloud_results = self.cloud_security_assessment()
results["findings"]["cloud_security"] = cloud_results
# Risk Calculation
results["risk_rating"] = self.calculate_risk(results["findings"])
return results
def network_discovery(self, scope):
"""Network reconnaissance and vulnerability discovery"""
# Implementation details...
pass
def web_app_testing(self, scope):
"""Web application security testing"""
# Implementation details...
pass
def api_security_testing(self, scope):
"""API security assessment"""
# Implementation details...
pass
def cloud_security_assessment(self):
"""Cloud infrastructure security review"""
# Implementation details...
pass
🏆 CTF Competition Framework
Automated CTF Challenge Solver
class CTFSolver:
"""Automated CTF challenge analysis and solving"""
def __init__(self):
self.api_base = "http://localhost:5000"
self.categories = {
"forensics": self.solve_forensics,
"crypto": self.solve_crypto,
"web": self.solve_web,
"pwn": self.solve_pwn,
"reverse": self.solve_reverse
}
def analyze_challenge(self, challenge_file, category=None):
"""Automatically analyze and attempt to solve CTF challenge"""
if not category:
category = self.detect_category(challenge_file)
if category in self.categories:
return self.categories[category](challenge_file)
else:
return self.generic_analysis(challenge_file)
def solve_forensics(self, file_path):
"""Automated forensics analysis"""
results = {}
# Memory dump analysis
if file_path.endswith('.dump') or file_path.endswith('.mem'):
vol_result = requests.post(f"{self.api_base}/api/tools/volatility3",
json={"memory_file": file_path, "plugin": "windows.pslist"})
results["memory_analysis"] = vol_result.json()
# File carving
foremost_result = requests.post(f"{self.api_base}/api/tools/foremost",
json={"input_file": file_path, "output_dir": "/tmp/carved"})
results["file_carving"] = foremost_result.json()
# Steganography detection
steg_result = requests.post(f"{self.api_base}/api/tools/steghide",
json={"action": "info", "cover_file": file_path})
results["steganography"] = steg_result.json()
return results
def solve_web(self, url):
"""Automated web challenge solving"""
# AI payload generation for web challenges
payload_result = requests.post(f"{self.api_base}/api/ai/generate_attack_suite",
json={"target_url": url, "attack_types": "xss,sqli,lfi,ssti"})
return payload_result.json()
💰 Bug Bounty Automation
Intelligent Target Discovery
class BugBountyHunter:
"""Automated bug bounty hunting framework"""
def __init__(self):
self.api_base = "http://localhost:5000"
self.discovered_assets = []
self.vulnerabilities = []
def hunt(self, target_domain, scope_file=None):
"""Complete bug bounty hunting workflow"""
# Phase 1: Asset Discovery
print("🎯 Phase 1: Asset Discovery")
assets = self.discover_assets(target_domain)
# Phase 2: Technology Stack Analysis
print("🔍 Phase 2: Technology Analysis")
tech_stack = self.analyze_technology_stack(assets)
# Phase 3: Vulnerability Discovery
print("💥 Phase 3: Vulnerability Discovery")
vulns = self.discover_vulnerabilities(assets, tech_stack)
# Phase 4: Exploitation Validation
print("🧪 Phase 4: Exploitation Validation")
validated_vulns = self.validate_vulnerabilities(vulns)
return {
"assets": assets,
"technology_stack": tech_stack,
"vulnerabilities": vulns,
"validated_vulnerabilities": validated_vulns
}
def discover_assets(self, domain):
"""Multi-source asset discovery"""
assets = []
# Subdomain enumeration
amass_result = requests.post(f"{self.api_base}/api/tools/amass",
json={"domain": domain, "mode": "enum"})
# HTTP probing
httpx_result = requests.post(f"{self.api_base}/api/tools/httpx",
json={"targets": domain})
# Web crawling
hakrawler_result = requests.post(f"{self.api_base}/api/tools/hakrawler",
json={"url": f"https://{domain}", "depth": 3})
return assets
def analyze_technology_stack(self, assets):
"""Technology fingerprinting and analysis"""
# Implementation for technology detection
pass
def discover_vulnerabilities(self, assets, tech_stack):
"""AI-powered vulnerability discovery"""
vulns = []
for asset in assets:
# Generate contextual payloads based on technology stack
payload_result = requests.post(f"{self.api_base}/api/ai/generate_payload",
json={
"attack_type": "xss",
"technology": tech_stack.get(asset, "generic"),
"complexity": "advanced"
})
vulns.append(payload_result.json())
return vulns
Contributing
We welcome contributions from the cybersecurity community! Here's how you can help make HexStrike AI even better:
🔧 Development Environment Setup
# 1. Fork and clone the repository
git clone https://github.com/0x4m4/hexstrike-ai.git
cd hexstrike-ai
# 2. Create development environment
python3 -m venv hexstrike-dev
source hexstrike-dev/bin/activate
# 3. Install development dependencies
pip install -r requirements-dev.txt
# 4. Install pre-commit hooks
pre-commit install
# 5. Run tests to ensure everything works
python -m pytest tests/ -v
# 6. Start development server
python3 hexstrike_server.py --port 5000 --debug
📝 Contribution Guidelines
- 🍴 Fork the repository on GitHub
- 🌿 Create a feature branch (
git checkout -b feature/amazing-security-tool) - 🔧 Develop your enhancement with comprehensive testing
- 📚 Document your changes with examples and usage
- ✅ Test thoroughly across different environments
- 📤 Submit a detailed pull request
🎯 Priority Areas for Contribution
- 🛠️ New Security Tools - Integration of additional penetration testing tools
- 🧠 AI Enhancements - Improved payload generation and analysis algorithms
- ⚡ Performance - Optimization, caching improvements, and scalability
- 📖 Documentation - Tutorials, use cases, and advanced examples
- 🧪 Testing - Unit tests, integration tests, and security validations
- 🌐 Integrations - New AI platforms and cybersecurity frameworks
💡 Feature Request Process
- 🔍 Check existing issues and feature requests
- 📝 Create detailed issue with use case description
- 💬 Discuss implementation approach with maintainers
- 🚀 Implement with proper testing and documentation
- 🎉 Celebrate your contribution to the community!
🔒 Security Considerations
⚠️ Important Security Notes:
- This tool executes system commands and should only be used in controlled environments
- Run on isolated systems or VMs
- Consider implementing authentication for production use
- Monitor system resources and set appropriate limits
🤝 MCP Integration
HexStrike AI implements the Model Context Protocol (MCP) for seamless AI agent integration:
# AI agents can call tools directly:
nmap_scan(target="example.com", ports="80,443")
nuclei_scan(target="https://example.com", severity="high")
create_file(filename="exploit.py", content="python_code_here")
📈 Performance Features
- ⚡ Result Caching: 50% faster repeated operations
- 🔄 Concurrent Execution: Multiple tools can run simultaneously
- 📊 Real-time Progress: Live command output and progress tracking
- 💾 Memory Optimization: Efficient handling of large outputs
- 🔧 Automatic Cleanup: Temporary files and processes are managed
🛠️ Troubleshooting
Common Issues
-
Connection Refused:
# Check if server is running netstat -tlnp | grep 5000 # Start server python3 hexstrike_server.py -
Missing Tools:
# Install missing tools apt update && apt install nmap gobuster nuclei # Check tool availability curl http://localhost:5000/health -
Python Package Issues:
# Install in virtual environment python3 -m venv hexstrike_env source hexstrike_env/bin/activate pip install flask psutil requests fastmcp
Debug Mode
Enable debug mode for detailed logging:
python3 hexstrike_server.py --debug
python3 hexstrike_mcp.py --debug
🔄 Architecture Overview
graph TD
A[AI Agent] -->|MCP Protocol| B[hexstrike_mcp.py]
B -->|HTTP/JSON| C[hexstrike_server.py]
C -->|Enhanced Execution| D[Security Tools]
C -->|Caching| E[Cache Layer]
C -->|Telemetry| F[Metrics Collection]
C -->|File Ops| G[File System]
D -->|Results| C
E -->|Fast Retrieval| B
F -->|Analytics| B
G -->|File Management| B
🎯 What's New in v5.0
🔥 Major Enhancements
- Visual Overhaul: Reddish color scheme, enhanced banner, real-time logging
- Advanced Caching: LRU cache with TTL for 50% performance improvement
- Cloud Security: Prowler, Trivy, kube-hunter integration
- File Operations: Complete file management system
- Python Environment: Automatic dependency management
- Telemetry: Comprehensive system monitoring
🆕 New Features
- Real-time command output streaming
- Progress indicators for long-running operations
- Payload generation (up to 100MB)
- Cache management endpoints
- Enhanced error handling with partial results
- System resource monitoring
📝 Contributing
- Fork the repository
- Create a feature branch
- Make your changes
- Test thoroughly
- Submit a pull request
📄 License
MIT License - see LICENSE file for details.
👨💻 Author
m0x4m4 - www.0x4m4.com
HexStrike AI v5.0 - The future of AI-driven cybersecurity automation!