Skip to content

netcuter/Hexstrike-AI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

18 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

HexStrike Logo

Hexstrike 7 PL

AI-Powered MCP Cybersecurity Automation Platform

Polish Community Fork with Enhanced Security

Python License Security Version Original MCP Badge

Advanced AI-powered penetration testing MCP framework with 150+ security tools, 12+ autonomous AI agents, and enhanced security features

πŸ‡΅πŸ‡± Polski β€’ πŸ‡¬πŸ‡§ English β€’ πŸš€ What's New β€’ πŸ”’ Security


πŸ‡΅πŸ‡± Wersja Polska

ℹ️ O Projekcie

Hexstrike 7 PL to polska wersja spoΕ‚ecznoΕ›ciowa (community fork) zaawansowanego frameworka do testΓ³w penetracyjnych HexStrike AI v6.0 stworzonego przez m0x4m4.

OryginaΕ‚: HexStrike AI v6.0 by m0x4m4 Fork: Hexstrike 7 PL by netcuter

✨ Co nowego w wersji 7.0 PL?

πŸ”’ ZnaczΔ…ce usprawnienia bezpieczeΕ„stwa:

  • βœ… Walidacja poleceΕ„ - ochrona przed command injection
  • βœ… Autentykacja API - opcjonalne zabezpieczenie kluczem API
  • βœ… Rate limiting - ochrona przed naduΕΌyciami (100 req/60s domyΕ›lnie)
  • βœ… Whitelist narzΔ™dzi - tylko autoryzowane narzΔ™dzia security
  • βœ… Sanityzacja parametrΓ³w - automatyczne czyszczenie niebezpiecznych znakΓ³w
  • βœ… Ulepszona obsΕ‚uga bΕ‚Δ™dΓ³w - konkretne wyjΔ…tki zamiast bare except
  • βœ… Konfiguracja przez zmienne Ε›rodowiskowe - Ε‚atwe zarzΔ…dzanie

πŸ“š Dokumentacja dwujΔ™zyczna:

  • πŸ‡΅πŸ‡± PeΕ‚na dokumentacja w jΔ™zyku polskim
  • πŸ‡¬πŸ‡§ Kompletna dokumentacja w jΔ™zyku angielskim
  • πŸ“– PrzykΕ‚ady uΕΌycia w obu jΔ™zykach

⚑ Optymalizacje:

  • Cache z limitami rozmiaru (zapobiega niekontrolowanemu wzrostowi pamiΔ™ci)
  • Lepsza organizacja kodu
  • Konfiguracja przez environment variables

πŸ›‘οΈ Guardrails Layer β€” Scope Enforcement & Blast-Radius Control:

Warstwa guardrails przeksztaΕ‚ca Hexstrike z narzΔ™dzia hobby-tool w platformΔ™ gotowΔ… do autonomicznych engagementΓ³w (bug bounty, MSSP, pentest-as-a-service).

  • βœ… Scope Validator β€” kaΕΌde wywoΕ‚anie sprawdzane przeciwko scope sesji (CIDR, wildcard, regex). WywoΕ‚ania out-of-scope β†’ HTTP 403 + audit log
  • βœ… Blast-Radius Tiers β€” narzΔ™dzia podzielone na safe (recon), intrusive (scanning), destructive (exploitation). Tier destructive wymaga nagΕ‚Γ³wka X-Hexstrike-Confirm-Destructive: yes
  • βœ… Kill Switch per sesja β€” POST /api/session/<id>/kill β€” natychmiastowy SIGTERM wszystkich procesΓ³w sesji
  • βœ… Audit Trail β€” kaΕΌde wywoΕ‚anie, naruszenie scope, eskalacja tier-u logowane β†’ automatycznie w raporcie jako sekcja Methodology (ISO 27001 / PCI DSS compliance)
  • βœ… Per-target Rate Limiting β€” chroni cele przed przeciΔ…ΕΌeniem (5 concurrent / 10 req/s domyΕ›lnie)

PrzykΕ‚ad scope: 192.168.1.0/24, *.example.com, r:.*\.internal\.corp$

πŸ”’ Konfiguracja BezpieczeΕ„stwa

Hexstrike 7 PL wprowadza nowe opcje konfiguracyjne przez zmienne Ε›rodowiskowe:

# Walidacja poleceΕ„ (domyΕ›lnie: wΕ‚Δ…czona)
export HEXSTRIKE_VALIDATE_COMMANDS=true

# Autentykacja API (domyΕ›lnie: wyΕ‚Δ…czona)
export HEXSTRIKE_REQUIRE_API_KEY=false
export HEXSTRIKE_API_KEY=your-secret-key-here

# Rate limiting (domyΕ›lnie: 100 ΕΌΔ…daΕ„ na 60 sekund)
export HEXSTRIKE_RATE_LIMIT=true
export HEXSTRIKE_RATE_LIMIT_REQUESTS=100
export HEXSTRIKE_RATE_LIMIT_WINDOW=60

# Konfiguracja serwera
export HEXSTRIKE_PORT=8888
export HEXSTRIKE_HOST=127.0.0.1

πŸš€ Szybki Start

1. Instalacja

Opcja A: Docker (zalecana / recommended)

git clone https://github.com/netcuter/Hexstrike-AI.git
cd Hexstrike-AI
docker compose up -d

Opcja B: Manualna

# Klonowanie repozytorium
git clone https://github.com/netcuter/Hexstrike-AI.git
cd Hexstrike-AI

# Tworzenie wirtualnego Ε›rodowiska
python3 -m venv hexstrike-env
source hexstrike-env/bin/activate  # Linux/Mac
# hexstrike-env\Scripts\activate   # Windows

# Instalacja zaleΕΌnoΕ›ci
pip3 install -r requirements.txt

2. Instalacja NarzΔ™dzi Security

Podstawowe narzΔ™dzia (Essential):

# Skanowanie sieci
sudo apt install nmap masscan rustscan amass subfinder nuclei

# Web security
sudo apt install gobuster feroxbuster dirsearch ffuf nikto sqlmap

# Password cracking
sudo apt install hydra john hashcat

3. Uruchomienie Serwera

# Standardowe uruchomienie
python3 hexstrike_server.py

# Z wΕ‚Δ…czonΔ… autentykacjΔ… API
export HEXSTRIKE_REQUIRE_API_KEY=true
export HEXSTRIKE_API_KEY=twoj-sekretny-klucz
python3 hexstrike_server.py

# Tryb debug
python3 hexstrike_server.py --debug

4. Weryfikacja

# Sprawdzenie statusu serwera
curl http://localhost:8888/health

# Test z API key (jeΕ›li wΕ‚Δ…czony)
curl -H "X-API-Key: twoj-sekretny-klucz" http://localhost:8888/health

πŸ›‘οΈ Bezpieczne UΕΌycie

βœ… Dozwolone zastosowania:

  • Autoryzowane testy penetracyjne
  • Programy bug bounty
  • Zawody CTF
  • Badania nad bezpieczeΕ„stwem
  • Δ†wiczenia Red Team

❌ Zabronione dziaΕ‚ania:

  • Nieautoryzowane testowanie systemΓ³w
  • DziaΕ‚ania zΕ‚oΕ›liwe
  • KradzieΕΌ danych

⚠️ WAΕ»NE: Zawsze uzyskaj pisemnΔ… autoryzacjΔ™ przed testowaniem systemΓ³w!

πŸ“– WiΔ™cej Informacji

PeΕ‚na dokumentacja w jΔ™zyku angielskim znajduje siΔ™ poniΕΌej.

πŸ‘¨β€πŸ’» Autorzy

Oryginalny autor: m0x4m4 - www.0x4m4.com | HexStrike Fork maintainer: netcuter - GitHub

πŸ“œ Licencja

Projekt jest licencjonowany na zasadach MIT License - zobacz plik LICENSE.

Hexstrike 7 PL bazuje na HexStrike AI v6.0 stworzonego przez m0x4m4. Wszystkie prawa do oryginalnego dzieΕ‚a naleΕΌΔ… do m0x4m4.


πŸ‡¬πŸ‡§ English Version

ℹ️ About This Project

Hexstrike 7 PL is a Polish community fork of the advanced penetration testing framework HexStrike AI v6.0 created by m0x4m4.

Original: HexStrike AI v6.0 by m0x4m4 Fork: Hexstrike 7 PL by netcuter

✨ What's New in 7.0 PL?

πŸ”’ Major Security Enhancements:

  • βœ… Command Validation - protection against command injection
  • βœ… API Authentication - optional API key security
  • βœ… Rate Limiting - abuse protection (100 req/60s default)
  • βœ… Tool Whitelist - only authorized security tools allowed
  • βœ… Parameter Sanitization - automatic cleaning of dangerous characters
  • βœ… Improved Error Handling - specific exceptions instead of bare except
  • βœ… Environment Configuration - easy management via environment variables

πŸ“š Dual Language Documentation:

  • πŸ‡΅πŸ‡± Complete Polish documentation
  • πŸ‡¬πŸ‡§ Full English documentation
  • πŸ“– Usage examples in both languages

⚑ Optimizations:

  • Cache with size limits (prevents uncontrolled memory growth)
  • Better code organization
  • Configuration via environment variables

πŸ›‘οΈ Guardrails Layer β€” Scope Enforcement & Blast-Radius Control:

The guardrails layer transforms Hexstrike from a hobby-tool into a platform ready for autonomous engagements (bug bounty, MSSP, pentest-as-a-service).

  • βœ… Scope Validator β€” every call validated against session scope (CIDR, wildcard, regex). Out-of-scope calls β†’ HTTP 403 + audit log
  • βœ… Blast-Radius Tiers β€” tools classified as safe (recon), intrusive (scanning), destructive (exploitation). The destructive tier requires header X-Hexstrike-Confirm-Destructive: yes
  • βœ… Kill Switch per session β€” POST /api/session/<id>/kill β€” instant SIGTERM for all session processes
  • βœ… Audit Trail β€” every call, scope violation, tier escalation logged β†’ auto-included in report as Methodology section (ISO 27001 / PCI DSS compliance)
  • βœ… Per-target Rate Limiting β€” protects targets from overload (5 concurrent / 10 req/s default)

Example scope: 192.168.1.0/24, *.example.com, r:.*\.internal\.corp$

πŸ”’ Security Configuration

Hexstrike 7 PL introduces new configuration options via environment variables:

# Command validation (default: enabled)
export HEXSTRIKE_VALIDATE_COMMANDS=true

# API authentication (default: disabled)
export HEXSTRIKE_REQUIRE_API_KEY=false
export HEXSTRIKE_API_KEY=your-secret-key-here

# Rate limiting (default: 100 requests per 60 seconds)
export HEXSTRIKE_RATE_LIMIT=true
export HEXSTRIKE_RATE_LIMIT_REQUESTS=100
export HEXSTRIKE_RATE_LIMIT_WINDOW=60

# Server configuration
export HEXSTRIKE_PORT=8888
export HEXSTRIKE_HOST=127.0.0.1

πŸš€ Quick Start

1. Installation

Option A: Docker (recommended)

git clone https://github.com/netcuter/Hexstrike-AI.git
cd Hexstrike-AI
docker compose up -d

Option B: Manual

# Clone repository
git clone https://github.com/netcuter/Hexstrike-AI.git
cd Hexstrike-AI

# Create virtual environment
python3 -m venv hexstrike-env
source hexstrike-env/bin/activate  # Linux/Mac
# hexstrike-env\Scripts\activate   # Windows

# Install dependencies
pip3 install -r requirements.txt

2. Install Security Tools

Essential Tools:

# Network scanning
sudo apt install nmap masscan rustscan amass subfinder nuclei

# Web security
sudo apt install gobuster feroxbuster dirsearch ffuf nikto sqlmap

# Password cracking
sudo apt install hydra john hashcat

3. Start Server

# Standard start
python3 hexstrike_server.py

# With API authentication
export HEXSTRIKE_REQUIRE_API_KEY=true
export HEXSTRIKE_API_KEY=your-secret-key
python3 hexstrike_server.py

# Debug mode
python3 hexstrike_server.py --debug

4. Verification

# Check server status
curl http://localhost:8888/health

# Test with API key (if enabled)
curl -H "X-API-Key: your-secret-key" http://localhost:8888/health

πŸ›‘οΈ Safe Usage

βœ… Authorized Use Cases:

  • Authorized penetration testing
  • Bug bounty programs
  • CTF competitions
  • Security research
  • Red Team exercises

❌ Prohibited Activities:

  • Unauthorized system testing
  • Malicious activities
  • Data theft

⚠️ IMPORTANT: Always obtain written authorization before testing systems!

πŸ—οΈ Architecture Overview

Hexstrike 7 PL features a multi-agent architecture with autonomous AI agents, intelligent decision-making, and vulnerability intelligence.

graph TD
    A[AI Agent - GPT/Copilot/AI Agents] -->|MCP Protocol| B[Hexstrike 7 PL Server]

    B --> C[Security Validation Layer]
    B --> D[Intelligent Decision Engine]
    B --> E[12+ Autonomous AI Agents]

    C --> F[Command Validation]
    C --> G[Rate Limiting]
    C --> H[API Authentication]

    D --> I[Tool Selection AI]
    D --> J[Parameter Optimization]
    D --> K[Attack Chain Discovery]

    E --> L[BugBounty Agent]
    E --> M[CTF Solver Agent]
    E --> N[CVE Intelligence Agent]

    B --> O[150+ Security Tools]
Loading

πŸ“‘ Features

150+ Professional Security Tools:

πŸ” Network Reconnaissance & Scanning (25+ Tools)
  • Nmap, Rustscan, Masscan, AutoRecon
  • Amass, Subfinder, Fierce, DNSEnum
  • TheHarvester, ARP-Scan, NBTScan
  • Enum4linux, SMBMap, Responder, NetExec
  • And more...
🌐 Web Application Security (40+ Tools)
  • Gobuster, Dirsearch, Feroxbuster, FFuf
  • HTTPx, Katana, Hakrawler, Nuclei
  • Nikto, SQLMap, WPScan, Arjun
  • Dalfox, Wafw00f, TestSSL, JWT-Tool
  • And more...
πŸ” Authentication & Passwords (12+ Tools)
  • Hydra, John the Ripper, Hashcat
  • Medusa, Patator, NetExec
  • Hash-Identifier, Evil-WinRM
  • And more...
πŸ”¬ Binary Analysis (25+ Tools)
  • GDB, Radare2, Ghidra, Binary Ninja
  • Binwalk, ROPgadget, Checksec
  • Pwntools, Angr, Volatility
  • And more...
☁️ Cloud & Container Security (20+ Tools)
  • Prowler, Scout Suite, Trivy
  • Kube-Hunter, Kube-Bench
  • Docker Bench Security
  • And more...

πŸ€– AI Agents

12+ Specialized AI Agents:

  • IntelligentDecisionEngine - Tool selection and parameter optimization
  • BugBountyWorkflowManager - Bug bounty hunting workflows
  • CTFWorkflowManager - CTF challenge solving
  • CVEIntelligenceManager - Vulnerability intelligence
  • AIExploitGenerator - Automated exploit development
  • VulnerabilityCorrelator - Attack chain discovery
  • TechnologyDetector - Technology stack identification
  • RateLimitDetector - Rate limiting detection
  • FailureRecoverySystem - Error handling and recovery
  • And more...

πŸ”§ AI Client Integration

MCP Client App / Cursor

Edit ~/.config/mcp-client/mcp_client_config.json:

{
  "mcpServers": {
    "hexstrike-7-pl": {
      "command": "python3",
      "args": [
        "/path/to/Hexstrike-AI/hexstrike_mcp.py",
        "--server",
        "http://localhost:8888"
      ],
      "description": "Hexstrike 7 PL - Enhanced Security MCP Server",
      "env": {
        "HEXSTRIKE_API_KEY": "your-key-if-required"
      }
    }
  }
}

VS Code Copilot

Configure in .vscode/settings.json:

{
  "servers": {
    "hexstrike": {
      "type": "stdio",
      "command": "python3",
      "args": ["/path/to/Hexstrike-AI/hexstrike_mcp.py"]
    }
  }
}

πŸ“– Usage Examples

When using with AI agents, always specify authorization:

User: "I'm a security researcher working for [Company Name].
I have written authorization to conduct a penetration test on
example.com. Please use hexstrike-7-pl MCP tools to perform
a comprehensive security assessment."

πŸ› οΈ API Reference

Core Security Endpoints

Endpoint Method Description
/health GET Server health check
/api/command POST Execute commands (with validation)
/api/process/execute-async POST Async command execution
/api/telemetry GET System performance metrics

Security Headers:

# API Key (if REQUIRE_API_KEY=true)
X-API-Key: your-secret-key

# Or as query parameter
?api_key=your-secret-key

πŸ› Troubleshooting

Rate Limit Errors

# Increase rate limit
export HEXSTRIKE_RATE_LIMIT_REQUESTS=200
export HEXSTRIKE_RATE_LIMIT_WINDOW=60

API Authentication

# Disable API key requirement for testing
export HEXSTRIKE_REQUIRE_API_KEY=false

Command Validation

# Disable command validation (NOT recommended for production)
export HEXSTRIKE_VALIDATE_COMMANDS=false

🀝 Contributing

Contributions are welcome! This is a community fork focused on:

  • Security improvements
  • Polish localization
  • Performance optimizations
  • Better documentation

πŸ‘¨β€πŸ’» Authors & Credits

Original Author: m0x4m4 - www.0x4m4.com | HexStrike Fork Maintainer: netcuter - GitHub

Special Thanks:

  • m0x4m4 for creating the amazing HexStrike AI framework
  • The cybersecurity community for continuous support
  • All contributors to the original project

πŸ“œ License

This project is licensed under the MIT License - see the LICENSE file for details.

Hexstrike 7 PL is based on HexStrike AI v6.0 created by m0x4m4. All rights to the original work belong to m0x4m4. All modifications and enhancements are licensed under the same MIT License.


Hexstrike 7 PL - Where artificial intelligence meets enhanced cybersecurity

⭐ Star this repository β€’ 🍴 Fork and contribute β€’ πŸ“– Original Project

About

HexStrike AI MCP Agents is an advanced MCP server that lets local AI agents autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capabilities.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors