SkillAgentSearch skills...

Hexstrike AI Community Edition

HexStrike AI Community Edition - Cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capabilities.

Install / Use

/learn @CommonHuman-Lab/Hexstrike AI Community Edition
About this skill

Quality Score

0/100

Supported Platforms

Claude Code
Cursor

README

<div align="center"> <img src="assets/hex_logo.png" alt="HexStrike" width="220"/>

HexStrike AI - Community Edition

AI-Powered MCP Cybersecurity Automation Platform

Python License Security MCP

Advanced AI-powered penetration testing MCP framework, on-demand TTP knowledge, and adaptive scanning intelligence

📡 Wiki

<p align="center"> <a href="https://discord.gg/aC8Q2xJFgp"> <img src="https://img.shields.io/badge/Discord-Join-7289DA?logo=discord&logoColor=white&style=for-the-badge" alt="Join Discord Community" /> </a> </p> </div>

🚀 Differences from HexStrike V6

  • Bigger Arsenal + Better Agents: Expanded tool coverage, workflow skills, and specialist end-to-end agent systems.
  • Dashboard: Run tools, monitor health, stream logs, and export reports from one UI.
  • Global Command Palette (Ctrl/Cmd+K): Jump pages, trigger tools, and move faster with keyboard-first control.
  • Personalized Run Workflow: Favorite tools, recent targets, and quick compare with previous runs.
  • Persistent Run History: Server-side run history survives browser refresh/reset and clears safely with confirmation.
  • Theme System Built In: One-click theme switcher with hover preview (Dark, Candy, Unicorn, Minimal, and more).
  • Performance Modes: --compact for lightweight/local LLM usage and --profile for targeted tool loading.
  • Core Improvements: Refactored architecture, updated dependencies, smarter parameter handling, and upgraded MCP orchestration (FastMCP v3).

Details

<details> <summary>Web Dashboard</summary>

Served automatically at http://localhost:8888 the moment the server starts — no extra setup required.

What you get:

  • Dashboard — KPI cards for tools installed, command telemetry, uptime and more.
  • Tool Run — Run any tool, straight from the dashboard!
  • Reports — Searchable, filterable tool run history, with export.
  • Tool Registry — Searchable, filterable for all registered tools. Click any tool for more details.
  • Server Logs — near-realtime SSE log stream.
  • Help — IDE/agent configuration snippets for Claude Desktop, VS Code Copilot, Cursor, and OpenCode.
  • And much more!
<img src="assets/screenshots/dashboard.png" alt="dashboard" style="margin-bottom: 20px;"/> <img src="assets/screenshots/reports.png" alt="reports" style="margin-bottom: 20px;"/> <img src="assets/screenshots/tools.png" alt="reports" style="margin-bottom: 20px;"/> <img src="assets/screenshots/run_tool.png" alt="reports" style="margin-bottom: 20px;"/> </details> <details> <summary>Compact Mode (--compact)</summary>

Activate Compact Mode for the MCP server using the --compact flag. See Flags for more info

  • 🚦 Only the two essential gateway tools are loaded—perfect for lightweight deployments, automation pipelines, or running on resource-constrained systems.
  • 🏃 Great for running with smaller, local LLMs or when you want minimal overhead.
</details> <details> <summary>Profile Mode (--profile)</summary>

Specify one or more profiles to load only the relevant ones for your workflow. See Profile flags for more info

  • 🚀 Select profiles for targeted workflows to speed up scans and reduce resource usage.
  • 🌐 Use --profile full to enable the complete arsenal, it's on default out-the-box for the recommended set.
</details> <details> <summary>End-to-end Agents</summary>

See Agents for more info

HTB CTF Agent System (@htb-ctf)

A 14-specialist agent system built natively for OpenCode, designed to autonomously solve HTB machines and CTF challenges end-to-end.

Bug Bounty Agent System (@bugbounty)

A 7-specialist agent system built natively for OpenCode, designed for autonomous bug bounty hunting across web, API, and broad wildcard scopes.

Recon Agent System (@recon)

A 5-specialist agent system built natively for OpenCode, designed for pure read-only information gathering across domains, IP addresses, web applications, and APIs.

</details>

Installation

Quick Setup & Run Hexstrike Server

Note: Many tools (nmap, masscan, etc.) require elevated privileges for certain scan types. You can either run the setup as root, or grant individual tool capabilities (e.g. setcap cap_net_raw+ep /usr/bin/nmap). Running as root is simpler but less secure.

# 1. Clone the repository
git clone https://github.com/CommonHuman-Lab/hexstrike-ai-community-edition.git
cd hexstrike-ai-community-edition

# 2. Create virtual environment
python3 -m venv hexstrike-env
source hexstrike-env/bin/activate        # Linux/Mac
# sudo source hexstrike-env/bin/activate # Linux as root
# hexstrike-env\Scripts\activate         # Windows

# 3. Install Python dependencies
pip3 install -r requirements.txt

# 4. Start the API server
python3 hexstrike_server.py

# 5. Dashboard automatically at http://localhost:8888

# 6. In a separate terminal, start the MCP client
# (use the venv python to ensure dependencies are available)
hexstrike-env/bin/python3 hexstrike_mcp.py --server http://localhost:8888 --profile full

See Flags on how to customize the experience.

Verify Installation

# Browse to http://localhost:8888

# Test server API health
curl http://localhost:8888/health

Use Hexstrike

Installation & Demo Video

Watch the full installation and setup walkthrough here: YouTube - HexStrike AI Installation & Demo

<details> <summary>Supported AI Clients for Running & Integration</summary>

You can install and run HexStrike AI MCPs with various AI clients, including:

  • 5ire (Latest version v0.14.0 not supported for now)
  • VS Code Copilot
  • Roo Code
  • Cursor
  • Claude Desktop
  • OpenCode
  • Any MCP-compatible agent

Refer to the video above for step-by-step instructions and integration examples for these platforms.

</details> <details> <summary>Claude Desktop Integration or Cursor</summary>

Edit ~/.config/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "hexstrike": {
      "command": "/path/to/hexstrike/hexstrike-env/bin/python3",
      "args": [
        "/path/to/hexstrike/hexstrike_mcp.py",
        "--server",
        "http://localhost:8888",
        "--profile",
        "full"
      ],
      "description": "HexStrike AI Community Edition",
      "timeout": 300,
      "disabled": false
    }
  }
}
</details> <details> <summary>VS Code Copilot Integration</summary>

Configure VS Code settings in .vscode/settings.json:

{
  "servers": {
    "hexstrike": {
      "type": "stdio",
      "command": "/path/to/hexstrike/hexstrike-env/bin/python3",
      "args": [
        "/path/to/hexstrike/hexstrike_mcp.py",
        "--server",
        "http://localhost:8888",
        "--profile",
        "full"
      ]
    }
  },
  "inputs": []
}
</details> <details> <summary>OpenCode Integration</summary>

Configure OpenCode settings in ~/.config/opencode/opencode.json:

{
  "$schema": "https://opencode.ai/config.json",
  "mcp": {
    "hexstrike": {
      "type": "local",
      "command": [
        "/path/to/hexstrike/hexstrike-env/bin/python3",
        "/path/to/hexstrike/hexstrike_mcp.py",
        "--server",
        "http://127.0.0.1:8888",
        "--profile",
        "default"
      ],
      "enabled": true
    }
  }
}
</details>

Security Configuration

<details> <summary>Network Binding</summary>

By default, the server binds to 127.0.0.1 (localhost only). To configure security:

# Set an API token (server will require Bearer auth on all requests)
export HEXSTRIKE_API_TOKEN=your-secret-token

# Optionally bind to all interfaces (NOT recommended without a token)
export HEXSTRIKE_HOST=0.0.0.0

# Start the server
python3 hexstrike_server.py
</details>

Features

Security Tools Arsenal

Categories:

<details> <summary><b>🤖 Automated Recon & Enumeration</b></summary>
  • BBot – AI-powered reconnaissance and enumeration framework supporting subdomain discovery, module filtering, and safe/fast scanning
</details> <details> <summary><b>🗄️ Database Interaction & Querying</b></summary>
  • MySQL Query – Direct SQL querying and enumeration for MySQL/MariaDB databases
  • PostgreSQL Query – Direct SQL querying and enumeration for PostgreSQL databases
  • SQLite Query – Local file-based SQL querying for SQLite databases
</details> <details> <summary><b>🔍 Network Reconnaissance & Scanning</b></summary>
  • Nmap - Advanced port scanning with custom NSE scripts and service detection
  • Rustscan - Ultra-fast port scanner with intelligent rate limiting
  • Masscan - High-speed Internet-scale port scanning with banner grabbing
  • AutoRecon - Comprehensive automated reconnaissance with 35+ parameters
  • Amass - Advanced subdomain enumeration and OSINT gathering
  • Subfinder - Fast passive subdomain discovery with multiple sources
  • Fierce - DNS reconnaissance and zone transfer testing
  • DNSEnum - DNS information gathering and subdomain brute forcing
  • TheHarvester - Email and subdomain harvesting from multiple sources
View on GitHub
GitHub Stars38
CategoryDevelopment
Updated1d ago
Forks10

Languages

Python

Security Score

80/100

Audited on Apr 4, 2026

No findings