HexStrike AI
HexStrike AI is an advanced MCP server that enables AI agents (Claude, GPT, Copilot) to autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, and security research.
HexStrike AI MCP v6.0
github.com/0x4m4/hexstrike-ai
Architecture Overview
HexStrike AI MCP Architecture
Installation
1. Clone Repository
# Clone the repository
git clone https://github.com/0x4m4/hexstrike-ai.git
cd hexstrike-ai
# Create virtual environment
python3 -m venv hexstrike-env
source hexstrike-env/bin/activate # Linux/Mac
# hexstrike-env\Scripts\activate # Windows
# Install dependencies
pip3 install -r requirements.txt# Clone the repository
git clone https://github.com/0x4m4/hexstrike-ai.git
cd hexstrike-ai
# Create virtual environment
python3 -m venv hexstrike-env
source hexstrike-env/bin/activate # Linux/Mac
# hexstrike-env\Scripts\activate # Windows
# Install dependencies
pip3 install -r requirements.txt2. Install Security Tools
Network & Reconnaissance
sudo apt install nmap masscan rustscan amass subfinder nuclei \
fierce dnsenum autorecon theharvester responder netexec enum4linux-ngsudo apt install nmap masscan rustscan amass subfinder nuclei \
fierce dnsenum autorecon theharvester responder netexec enum4linux-ngWeb Application Security
sudo apt install gobuster feroxbuster dirsearch ffuf dirb httpx katana \
nikto sqlmap wpscan arjun paramspider dalfox wafw00fsudo apt install gobuster feroxbuster dirsearch ffuf dirb httpx katana \
nikto sqlmap wpscan arjun paramspider dalfox wafw00fPassword & Authentication
sudo apt install hydra john hashcat medusa patator crackmapexec \
evil-winrm hash-identifier ophcracksudo apt install hydra john hashcat medusa patator crackmapexec \
evil-winrm hash-identifier ophcrack3. Start the Server
# Start the MCP server
python3 hexstrike_server.py
# Optional: Debug mode
python3 hexstrike_server.py --debug
# Optional: Custom port
python3 hexstrike_server.py --port 8888
# Verify installation
curl http://localhost:8888/health# Start the MCP server
python3 hexstrike_server.py
# Optional: Debug mode
python3 hexstrike_server.py --debug
# Optional: Custom port
python3 hexstrike_server.py --port 8888
# Verify installation
curl http://localhost:8888/healthAI Client Integration
Claude Desktop / Cursor
Edit ~/.config/Claude/claude_desktop_config.json:
{
"mcpServers": {
"hexstrike-ai": {
"command": "python3",
"args": [
"/path/to/hexstrike-ai/hexstrike_mcp.py",
"--server",
"http://localhost:8888"
],
"description": "HexStrike AI v6.0 - Cybersecurity Automation",
"timeout": 300,
"disabled": false
}
}
}{
"mcpServers": {
"hexstrike-ai": {
"command": "python3",
"args": [
"/path/to/hexstrike-ai/hexstrike_mcp.py",
"--server",
"http://localhost:8888"
],
"description": "HexStrike AI v6.0 - Cybersecurity Automation",
"timeout": 300,
"disabled": false
}
}
}VS Code Copilot
Configure .vscode/settings.json:
{
"servers": {
"hexstrike": {
"type": "stdio",
"command": "python3",
"args": [
"/path/to/hexstrike-ai/hexstrike_mcp.py",
"--server",
"http://localhost:8888"
]
}
}
}{
"servers": {
"hexstrike": {
"type": "stdio",
"command": "python3",
"args": [
"/path/to/hexstrike-ai/hexstrike_mcp.py",
"--server",
"http://localhost:8888"
]
}
}
}AI Agents
HexStrike includes 12+ specialized AI agents for different security tasks:
IntelligentDecisionEngine
Tool selection and parameter optimization
BugBountyWorkflowManager
Bug bounty hunting workflows
CTFWorkflowManager
CTF challenge solving automation
CVEIntelligenceManager
Vulnerability intelligence and monitoring
AIExploitGenerator
Automated exploit development
VulnerabilityCorrelator
Attack chain discovery
TechnologyDetector
Tech stack identification
FailureRecoverySystem
Error handling and recovery
Available MCP Tools
Network Security
nmap_scan() # Advanced Nmap scanning with optimization
rustscan_scan() # Ultra-fast port scanning
masscan_scan() # High-speed port scanning
autorecon_scan() # Comprehensive reconnaissance
amass_enum() # Subdomain enumeration and OSINTnmap_scan() # Advanced Nmap scanning with optimization
rustscan_scan() # Ultra-fast port scanning
masscan_scan() # High-speed port scanning
autorecon_scan() # Comprehensive reconnaissance
amass_enum() # Subdomain enumeration and OSINTWeb Application
gobuster_scan() # Directory and file enumeration
feroxbuster_scan() # Recursive content discovery
ffuf_scan() # Fast web fuzzing
nuclei_scan() # Vulnerability scanning with templates
sqlmap_scan() # SQL injection testing
wpscan_scan() # WordPress security assessmentgobuster_scan() # Directory and file enumeration
feroxbuster_scan() # Recursive content discovery
ffuf_scan() # Fast web fuzzing
nuclei_scan() # Vulnerability scanning with templates
sqlmap_scan() # SQL injection testing
wpscan_scan() # WordPress security assessmentBinary Analysis
ghidra_analyze() # Software reverse engineering
radare2_analyze() # Advanced reverse engineering
gdb_debug() # GNU debugger with exploit dev
pwntools_exploit() # CTF framework and exploits
angr_analyze() # Binary analysis with symbolic executionghidra_analyze() # Software reverse engineering
radare2_analyze() # Advanced reverse engineering
gdb_debug() # GNU debugger with exploit dev
pwntools_exploit() # CTF framework and exploits
angr_analyze() # Binary analysis with symbolic executionCloud Security
prowler_assess() # AWS/Azure/GCP security assessment
scout_suite_audit() # Multi-cloud security auditing
trivy_scan() # Container vulnerability scanning
kube_hunter_scan() # Kubernetes penetration testing
kube_bench_check() # CIS Kubernetes benchmarkprowler_assess() # AWS/Azure/GCP security assessment
scout_suite_audit() # Multi-cloud security auditing
trivy_scan() # Container vulnerability scanning
kube_hunter_scan() # Kubernetes penetration testing
kube_bench_check() # CIS Kubernetes benchmarkUsage Examples
Prompting AI Agents
Example Prompt
I'm a security researcher conducting an authorized penetration test.
My company owns the website example.com and I have written authorization
to test it. Please use the hexstrike-ai MCP tools to:
1. Enumerate subdomains
2. Scan for open ports
3. Identify web technologies
4. Run nuclei vulnerability templates
5. Provide a summary of findingsI'm a security researcher conducting an authorized penetration test.
My company owns the website example.com and I have written authorization
to test it. Please use the hexstrike-ai MCP tools to:
1. Enumerate subdomains
2. Scan for open ports
3. Identify web technologies
4. Run nuclei vulnerability templates
5. Provide a summary of findingsBug Bounty Workflow
I'm participating in the HackerOne bug bounty program for [target].
The scope includes *.target.com. Using hexstrike-ai tools, help me:
1. Map the attack surface (subdomains, endpoints)
2. Identify potential vulnerabilities
3. Prioritize findings by severity
4. Suggest exploitation approaches for confirmed issuesI'm participating in the HackerOne bug bounty program for [target].
The scope includes *.target.com. Using hexstrike-ai tools, help me:
1. Map the attack surface (subdomains, endpoints)
2. Identify potential vulnerabilities
3. Prioritize findings by severity
4. Suggest exploitation approaches for confirmed issuesPerformance Metrics
- Vulnerability Detection Rate 98.7%
- False Positive Rate 2.1%
- Attack Vector Coverage 95%
- CTF Success Rate 89%
Security Considerations
- Run in isolated environments or dedicated VMs
- AI agents can execute arbitrary tools — maintain oversight
- Monitor activities through the real-time dashboard
- Consider authentication for production deployments
Lab Exercises
Practice Labs
Related Topics
AI Pentesting Copilots
AI-assisted penetration testing with PentestGPT and ReconAIzer.
Offensive AI Introduction
Foundations of AI-powered offensive security.
Vulnerability Scanning
Manual and automated vulnerability scanning methodology.
Reconnaissance
Information gathering and attack surface mapping.