首页 渗透工具 正文
  • 本文约11677字,阅读需58分钟
  • 96
  • 0

HexStrike AI MCP Agents v6.0

摘要

AI-Powered MCP Cybersecurity Automation Platform Advanced AI-powered penetration testing MCP framework with 150+ security tools and 12+ autonomous AI agents ? What s New • ?️ Archi...

AI-Powered MCP Cybersecurity Automation Platform

Python License Security MCP Version Tools Agents Stars

Advanced AI-powered penetration testing MCP framework with 150+ security tools and 12+ autonomous AI agents

📋 What's New🏗️ Architecture🚀 Installation🛠️ Features🤖 AI Agents📡 API Reference


Follow Our Social Accounts

Join our Discord Follow us on LinkedIn


Architecture Overview

HexStrike AI MCP v6.0 features a multi-agent architecture with autonomous AI agents, intelligent decision-making, and vulnerability intelligence.

<iframe title="File display" role="presentation" class="render-viewer" sandbox="allow-scripts allow-same-origin allow-top-navigation allow-popups" src="https://viewscreen.githubusercontent.com/markdown/mermaid?docs_host=https%3A%2F%2Fdocs.github.com&color_mode=light#b124eff5-1a56-4a38-aaa7-39166deebbd4" name="b124eff5-1a56-4a38-aaa7-39166deebbd4" data-content="{"data":"%%{init: {\"themeVariables\": {\n \"primaryColor\": \"#b71c1c\",\n \"secondaryColor\": \"#ff5252\",\n \"tertiaryColor\": \"#ff8a80\",\n \"background\": \"#2d0000\",\n \"edgeLabelBackground\":\"#b71c1c\",\n \"fontFamily\": \"monospace\",\n \"fontSize\": \"16px\",\n \"fontColor\": \"#fffde7\",\n \"nodeTextColor\": \"#fffde7\"\n}}}%%\ngraph TD\n A[AI Agent - Claude/GPT/Copilot] -->|MCP Protocol| B[HexStrike MCP Server v6.0]\n \n B --> C[Intelligent Decision Engine]\n B --> D[12+ Autonomous AI Agents]\n B --> E[Modern Visual Engine]\n \n C --> F[Tool Selection AI]\n C --> G[Parameter Optimization]\n C --> H[Attack Chain Discovery]\n \n D --> I[BugBounty Agent]\n D --> J[CTF Solver Agent]\n D --> K[CVE Intelligence Agent]\n D --> L[Exploit Generator Agent]\n \n E --> M[Real-time Dashboards]\n E --> N[Progress Visualization]\n E --> O[Vulnerability Cards]\n \n B --> P[150+ Security Tools]\n P --> Q[Network Tools - 25+]\n P --> R[Web App Tools - 40+]\n P --> S[Cloud Tools - 20+]\n P --> T[Binary Tools - 25+]\n P --> U[CTF Tools - 20+]\n P --> V[OSINT Tools - 20+]\n \n B --> W[Advanced Process Management]\n W --> X[Smart Caching]\n W --> Y[Resource Optimization]\n W --> Z[Error Recovery]\n \n style A fill:#b71c1c,stroke:#ff5252,stroke-width:3px,color:#fffde7\n style B fill:#ff5252,stroke:#b71c1c,stroke-width:4px,color:#fffde7\n style C fill:#ff8a80,stroke:#b71c1c,stroke-width:2px,color:#fffde7\n style D fill:#ff8a80,stroke:#b71c1c,stroke-width:2px,color:#fffde7\n style E fill:#ff8a80,stroke:#b71c1c,stroke-width:2px,color:#fffde7\n"}">

How It Works

  1. AI Agent Connection - Claude, GPT, or other MCP-compatible agents connect via FastMCP protocol
  2. Intelligent Analysis - Decision engine analyzes targets and selects optimal testing strategies
  3. Autonomous Execution - AI agents execute comprehensive security assessments
  4. Real-time Adaptation - System adapts based on results and discovered vulnerabilities
  5. Advanced Reporting - Visual output with vulnerability cards and risk analysis

Installation

Quick Setup to Run the hexstrike MCPs Server

# 1. Clone the repository
git clone https://github.com/0x4m4/hexstrike-ai.git
cd hexstrike-ai

# 2. Create virtual environment
python3 -m venv hexstrike-env
source hexstrike-env/bin/activate  # Linux/Mac
# hexstrike-env\Scripts\activate   # Windows

# 3. Install Python dependencies
pip3 install -r requirements.txt

Installation and Setting Up Guide for various AI Clients:

Installation & Demo Video

Watch the full installation and setup walkthrough here: YouTube - HexStrike AI Installation & Demo

Supported AI Clients for Running & Integration

You can install and run HexStrike AI MCPs with various AI clients, including:

  • 5ire (Latest version v0.14.0 not supported for now)
  • VS Code Copilot
  • Roo Code
  • Cursor
  • Claude Desktop
  • Any MCP-compatible agent

Refer to the video above for step-by-step instructions and integration examples for these platforms.

Install Security Tools

Core Tools (Essential):

# Network & Reconnaissance
nmap masscan rustscan amass subfinder nuclei fierce dnsenum
autorecon theharvester responder netexec enum4linux-ng

# Web Application Security
gobuster feroxbuster dirsearch ffuf dirb httpx katana
nikto sqlmap wpscan arjun paramspider dalfox wafw00f

# Password & Authentication
hydra john hashcat medusa patator crackmapexec
evil-winrm hash-identifier ophcrack

# Binary Analysis & Reverse Engineering
gdb radare2 binwalk ghidra checksec strings objdump
volatility3 foremost steghide exiftool

Cloud Security Tools:

prowler scout-suite trivy
kube-hunter kube-bench docker-bench-security

Browser Agent Requirements:

# Chrome/Chromium for Browser Agent
sudo apt install chromium-browser chromium-chromedriver
# OR install Google Chrome
wget -q -O - https://dl.google.com/linux/linux_signing_key.pub | sudo apt-key add -
echo "deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main" | sudo tee /etc/apt/sources.list.d/google-chrome.list
sudo apt update && sudo apt install google-chrome-stable

Start the Server

# Start the MCP server
python3 hexstrike_server.py

# Optional: Start with debug mode
python3 hexstrike_server.py --debug

# Optional: Custom port configuration
python3 hexstrike_server.py --port 8888

Verify Installation

# Test server health
curl http://localhost:8888/health

# Test AI agent capabilities
curl -X POST http://localhost:8888/api/intelligence/analyze-target \
  -H "Content-Type: application/json" \
  -d '{"target": "example.com", "analysis_type": "comprehensive"}'

AI Client Integration Setup

Claude Desktop Integration or Cursor

Edit ~/.config/Claude/claude_desktop_config.json:

{
  "mcpServers": {
    "hexstrike-ai": {
      "command": "python3",
      "args": [
        "/path/to/hexstrike-ai/hexstrike_mcp.py",
        "--server",
        "http://localhost:8888"
      ],
      "description": "HexStrike AI v6.0 - Advanced Cybersecurity Automation Platform",
      "timeout": 300,
      "disabled": false
    }
  }
}

VS Code Copilot Integration

Configure VS Code settings in .vscode/settings.json:

{
  "servers": {
    "hexstrike": {
      "type": "stdio",
      "command": "python3",
      "args": [
        "/path/to/hexstrike-ai/hexstrike_mcp.py",
        "--server",
        "http://localhost:8888"
      ]
    }
  },
  "inputs": []
}

Features

Security Tools Arsenal

150+ Professional Security Tools:

🔍 Network Reconnaissance & Scanning (25+ Tools)
🌐 Web Application Security Testing (40+ Tools)
🔐 Authentication & Password Security (12+ Tools)
🔬 Binary Analysis & Reverse Engineering (25+ Tools)
☁️ Cloud & Container Security (20+ Tools)
🏆 CTF & Forensics Tools (20+ Tools)
🔥 Bug Bounty & OSINT Arsenal (20+ Tools)

AI Agents

12+ Specialized AI Agents:

  • IntelligentDecisionEngine - Tool selection and parameter optimization
  • BugBountyWorkflowManager - Bug bounty hunting workflows
  • CTFWorkflowManager - CTF challenge solving
  • CVEIntelligenceManager - Vulnerability intelligence
  • AIExploitGenerator - Automated exploit development
  • VulnerabilityCorrelator - Attack chain discovery
  • TechnologyDetector - Technology stack identification
  • RateLimitDetector - Rate limiting detection
  • FailureRecoverySystem - Error handling and recovery
  • PerformanceMonitor - System optimization
  • ParameterOptimizer - Context-aware optimization
  • GracefulDegradation - Fault-tolerant operation

Advanced Features

  • Smart Caching System - Intelligent result caching with LRU eviction
  • Real-time Process Management - Live command control and monitoring
  • Vulnerability Intelligence - CVE monitoring and exploit analysis
  • Browser Agent - Headless Chrome automation for web testing
  • API Security Testing - GraphQL, JWT, REST API security assessment
  • Modern Visual Engine - Real-time dashboards and progress tracking

API Reference

Core System Endpoints

Endpoint Method Description
/health GET Server health check with tool availability
/api/command POST Execute arbitrary commands with caching
/api/telemetry GET System performance metrics
/api/cache/stats GET Cache performance statistics
/api/intelligence/analyze-target POST AI-powered target analysis
/api/intelligence/select-tools POST Intelligent tool selection
/api/intelligence/optimize-parameters POST Parameter optimization

Common MCP Tools

Network Security Tools:

  • nmap_scan() - Advanced Nmap scanning with optimization
  • rustscan_scan() - Ultra-fast port scanning
  • masscan_scan() - High-speed port scanning
  • autorecon_scan() - Comprehensive reconnaissance
  • amass_enum() - Subdomain enumeration and OSINT

Web Application Tools:

  • gobuster_scan() - Directory and file enumeration
  • feroxbuster_scan() - Recursive content discovery
  • ffuf_scan() - Fast web fuzzing
  • nuclei_scan() - Vulnerability scanning with templates
  • sqlmap_scan() - SQL injection testing
  • wpscan_scan() - WordPress security assessment

Binary Analysis Tools:

  • ghidra_analyze() - Software reverse engineering
  • radare2_analyze() - Advanced reverse engineering
  • gdb_debug() - GNU debugger with exploit development
  • pwntools_exploit() - CTF framework and exploit development
  • angr_analyze() - Binary analysis with symbolic execution

Cloud Security Tools:

  • prowler_assess() - AWS/Azure/GCP security assessment
  • scout_suite_audit() - Multi-cloud security auditing
  • trivy_scan() - Container vulnerability scanning
  • kube_hunter_scan() - Kubernetes penetration testing
  • kube_bench_check() - CIS Kubernetes benchmark assessment

Process Management

Action Endpoint Description
List Processes GET /api/processes/list List all active processes
Process Status GET /api/processes/status/<pid> Get detailed process information
Terminate POST /api/processes/terminate/<pid> Stop specific process
Dashboard GET /api/processes/dashboard Live monitoring dashboard

Usage Examples

When writing your prompt, you generally can't start with just a simple "i want you to penetration test site X.com" as the LLM's are generally setup with some level of ethics. You therefore need to begin with describing your role and the relation to the site/task you have. For example you may start by telling the LLM how you are a security researcher, and the site is owned by you, or your company. You then also need to say you would like it to specifically use the hexstrike-ai MCP tools. So a complete example might be:

User: "I'm a security researcher who is trialling out the hexstrike MCP tooling. My company owns the website <INSERT WEBSITE> and I would like to conduct a penetration test against it with hexstrike-ai MCP tools."

AI Agent: "Thank you for clarifying ownership and intent. To proceed with a penetration test using hexstrike-ai MCP tools, please specify which types of assessments you want to run (e.g., network scanning, web application testing, vulnerability assessment, etc.), or if you want a full suite covering all areas."

Real-World Performance

Operation Traditional Manual HexStrike v6.0 AI Improvement
Subdomain Enumeration 2-4 hours 5-10 minutes 24x faster
Vulnerability Scanning 4-8 hours 15-30 minutes 16x faster
Web App Security Testing 6-12 hours 20-45 minutes 18x faster
CTF Challenge Solving 1-6 hours 2-15 minutes 24x faster
Report Generation 4-12 hours 2-5 minutes 144x faster

Success Metrics

  • Vulnerability Detection Rate: 98.7% (vs 85% manual testing)
  • False Positive Rate: 2.1% (vs 15% traditional scanners)
  • Attack Vector Coverage: 95% (vs 70% manual testing)
  • CTF Success Rate: 89% (vs 65% human expert average)
  • Bug Bounty Success: 15+ high-impact vulnerabilities discovered in testing

HexStrike AI v7.0 - Release Coming Soon!

Key Improvements & New Features

  • Streamlined Installation Process - One-command setup with automated dependency management
  • Docker Container Support - Containerized deployment for consistent environments
  • 250+ Specialized AI Agents/Tools - Expanded from 150+ to 250+ autonomous security agents
  • Native Desktop Client - Full-featured Application (www.hexstrike.com)
  • Advanced Web Automation - Enhanced Selenium integration with anti-detection
  • JavaScript Runtime Analysis - Deep DOM inspection and dynamic content handling
  • Memory Optimization - 40% reduction in resource usage for large-scale operations
  • Enhanced Error Handling - Graceful degradation and automatic recovery mechanisms
  • Bypassing Limitations - Fixed limited allowed mcp tools by MCP clients

Troubleshooting

Common Issues

  1. MCP Connection Failed:

    # Check if server is running
    netstat -tlnp | grep 8888
    
    # Restart server
    python3 hexstrike_server.py
  2. Security Tools Not Found:

    # Check tool availability
    which nmap gobuster nuclei
    
    # Install missing tools from their official sources
  3. AI Agent Cannot Connect:
    # Verify MCP configuration paths
    # Check server logs for connection attempts
    python3 hexstrike_mcp.py --debug

Debug Mode

Enable debug mode for detailed logging:

python3 hexstrike_server.py --debug
python3 hexstrike_mcp.py --debug

Security Considerations

⚠️ Important Security Notes:

  • This tool provides AI agents with powerful system access
  • Run in isolated environments or dedicated security testing VMs
  • AI agents can execute arbitrary security tools - ensure proper oversight
  • Monitor AI agent activities through the real-time dashboard
  • Consider implementing authentication for production deployments

Legal & Ethical Use

  • Authorized Penetration Testing - With proper written authorization
  • Bug Bounty Programs - Within program scope and rules
  • CTF Competitions - Educational and competitive environments
  • Security Research - On owned or authorized systems
  • Red Team Exercises - With organizational approval
  • Unauthorized Testing - Never test systems without permission
  • Malicious Activities - No illegal or harmful activities
  • Data Theft - No unauthorized data access or exfiltration

Contributing

We welcome contributions from the cybersecurity and AI community!

Development Setup

# 1. Fork and clone the repository
git clone https://github.com/0x4m4/hexstrike-ai.git
cd hexstrike-ai

# 2. Create development environment
python3 -m venv hexstrike-dev
source hexstrike-dev/bin/activate

# 3. Install development dependencies
pip install -r requirements.txt

# 4. Start development server
python3 hexstrike_server.py --port 8888 --debug

Priority Areas for Contribution

  • 🤖 AI Agent Integrations - Support for new AI platforms and agents
  • 🛠️ Security Tool Additions - Integration of additional security tools
  • ⚡ Performance Optimizations - Caching improvements and scalability enhancements
  • 📖 Documentation - AI usage examples and integration guides
  • 🧪 Testing Frameworks - Automated testing for AI agent interactions

License

MIT License - see LICENSE file for details.


Author

m0x4m4 - www.0x4m4.com | HexStrike


Official Sponsor

Sponsored By LeaksAPI - Live Dark Web Data leak checker

LeaksAPI Logo LeaksAPI Banner

Visit leak-check.net

评论
博主关闭了评论
友情链接