Advanced AI-powered penetration testing MCP framework with 150+ security tools, 12+ autonomous AI agents, and enhanced security features
π΅π± Polski β’ π¬π§ English β’ π What's New β’ π Security
Hexstrike 7 PL to polska wersja spoΕecznoΕciowa (community fork) zaawansowanego frameworka do testΓ³w penetracyjnych HexStrike AI v6.0 stworzonego przez m0x4m4.
OryginaΕ: HexStrike AI v6.0 by m0x4m4 Fork: Hexstrike 7 PL by netcuter
- β Walidacja poleceΕ - ochrona przed command injection
- β Autentykacja API - opcjonalne zabezpieczenie kluczem API
- β Rate limiting - ochrona przed naduΕΌyciami (100 req/60s domyΕlnie)
- β Whitelist narzΔdzi - tylko autoryzowane narzΔdzia security
- β Sanityzacja parametrΓ³w - automatyczne czyszczenie niebezpiecznych znakΓ³w
- β Ulepszona obsΕuga bΕΔdΓ³w - konkretne wyjΔ tki zamiast bare except
- β Konfiguracja przez zmienne Εrodowiskowe - Εatwe zarzΔ dzanie
- π΅π± PeΕna dokumentacja w jΔzyku polskim
- π¬π§ Kompletna dokumentacja w jΔzyku angielskim
- π PrzykΕady uΕΌycia w obu jΔzykach
- Cache z limitami rozmiaru (zapobiega niekontrolowanemu wzrostowi pamiΔci)
- Lepsza organizacja kodu
- Konfiguracja przez environment variables
Warstwa guardrails przeksztaΕca Hexstrike z narzΔdzia hobby-tool w platformΔ gotowΔ do autonomicznych engagementΓ³w (bug bounty, MSSP, pentest-as-a-service).
- β Scope Validator β kaΕΌde wywoΕanie sprawdzane przeciwko scope sesji (CIDR, wildcard, regex). WywoΕania out-of-scope β HTTP 403 + audit log
- β
Blast-Radius Tiers β narzΔdzia podzielone na
safe(recon),intrusive(scanning),destructive(exploitation). Tierdestructivewymaga nagΕΓ³wkaX-Hexstrike-Confirm-Destructive: yes - β
Kill Switch per sesja β
POST /api/session/<id>/killβ natychmiastowy SIGTERM wszystkich procesΓ³w sesji - β Audit Trail β kaΕΌde wywoΕanie, naruszenie scope, eskalacja tier-u logowane β automatycznie w raporcie jako sekcja Methodology (ISO 27001 / PCI DSS compliance)
- β Per-target Rate Limiting β chroni cele przed przeciΔ ΕΌeniem (5 concurrent / 10 req/s domyΕlnie)
PrzykΕad scope: 192.168.1.0/24, *.example.com, r:.*\.internal\.corp$
Hexstrike 7 PL wprowadza nowe opcje konfiguracyjne przez zmienne Εrodowiskowe:
# Walidacja poleceΕ (domyΕlnie: wΕΔ
czona)
export HEXSTRIKE_VALIDATE_COMMANDS=true
# Autentykacja API (domyΕlnie: wyΕΔ
czona)
export HEXSTRIKE_REQUIRE_API_KEY=false
export HEXSTRIKE_API_KEY=your-secret-key-here
# Rate limiting (domyΕlnie: 100 ΕΌΔ
daΕ na 60 sekund)
export HEXSTRIKE_RATE_LIMIT=true
export HEXSTRIKE_RATE_LIMIT_REQUESTS=100
export HEXSTRIKE_RATE_LIMIT_WINDOW=60
# Konfiguracja serwera
export HEXSTRIKE_PORT=8888
export HEXSTRIKE_HOST=127.0.0.1Opcja A: Docker (zalecana / recommended)
git clone https://github.com/netcuter/Hexstrike-AI.git
cd Hexstrike-AI
docker compose up -dOpcja B: Manualna
# Klonowanie repozytorium
git clone https://github.com/netcuter/Hexstrike-AI.git
cd Hexstrike-AI
# Tworzenie wirtualnego Εrodowiska
python3 -m venv hexstrike-env
source hexstrike-env/bin/activate # Linux/Mac
# hexstrike-env\Scripts\activate # Windows
# Instalacja zaleΕΌnoΕci
pip3 install -r requirements.txtPodstawowe narzΔdzia (Essential):
# Skanowanie sieci
sudo apt install nmap masscan rustscan amass subfinder nuclei
# Web security
sudo apt install gobuster feroxbuster dirsearch ffuf nikto sqlmap
# Password cracking
sudo apt install hydra john hashcat# Standardowe uruchomienie
python3 hexstrike_server.py
# Z wΕΔ
czonΔ
autentykacjΔ
API
export HEXSTRIKE_REQUIRE_API_KEY=true
export HEXSTRIKE_API_KEY=twoj-sekretny-klucz
python3 hexstrike_server.py
# Tryb debug
python3 hexstrike_server.py --debug# Sprawdzenie statusu serwera
curl http://localhost:8888/health
# Test z API key (jeΕli wΕΔ
czony)
curl -H "X-API-Key: twoj-sekretny-klucz" http://localhost:8888/health- Autoryzowane testy penetracyjne
- Programy bug bounty
- Zawody CTF
- Badania nad bezpieczeΕstwem
- Δwiczenia Red Team
- Nieautoryzowane testowanie systemΓ³w
- DziaΕania zΕoΕliwe
- KradzieΕΌ danych
PeΕna dokumentacja w jΔzyku angielskim znajduje siΔ poniΕΌej.
Oryginalny autor: m0x4m4 - www.0x4m4.com | HexStrike Fork maintainer: netcuter - GitHub
Projekt jest licencjonowany na zasadach MIT License - zobacz plik LICENSE.
Hexstrike 7 PL bazuje na HexStrike AI v6.0 stworzonego przez m0x4m4. Wszystkie prawa do oryginalnego dzieΕa naleΕΌΔ do m0x4m4.
Hexstrike 7 PL is a Polish community fork of the advanced penetration testing framework HexStrike AI v6.0 created by m0x4m4.
Original: HexStrike AI v6.0 by m0x4m4 Fork: Hexstrike 7 PL by netcuter
- β Command Validation - protection against command injection
- β API Authentication - optional API key security
- β Rate Limiting - abuse protection (100 req/60s default)
- β Tool Whitelist - only authorized security tools allowed
- β Parameter Sanitization - automatic cleaning of dangerous characters
- β Improved Error Handling - specific exceptions instead of bare except
- β Environment Configuration - easy management via environment variables
- π΅π± Complete Polish documentation
- π¬π§ Full English documentation
- π Usage examples in both languages
- Cache with size limits (prevents uncontrolled memory growth)
- Better code organization
- Configuration via environment variables
The guardrails layer transforms Hexstrike from a hobby-tool into a platform ready for autonomous engagements (bug bounty, MSSP, pentest-as-a-service).
- β Scope Validator β every call validated against session scope (CIDR, wildcard, regex). Out-of-scope calls β HTTP 403 + audit log
- β
Blast-Radius Tiers β tools classified as
safe(recon),intrusive(scanning),destructive(exploitation). Thedestructivetier requires headerX-Hexstrike-Confirm-Destructive: yes - β
Kill Switch per session β
POST /api/session/<id>/killβ instant SIGTERM for all session processes - β Audit Trail β every call, scope violation, tier escalation logged β auto-included in report as Methodology section (ISO 27001 / PCI DSS compliance)
- β Per-target Rate Limiting β protects targets from overload (5 concurrent / 10 req/s default)
Example scope: 192.168.1.0/24, *.example.com, r:.*\.internal\.corp$
Hexstrike 7 PL introduces new configuration options via environment variables:
# Command validation (default: enabled)
export HEXSTRIKE_VALIDATE_COMMANDS=true
# API authentication (default: disabled)
export HEXSTRIKE_REQUIRE_API_KEY=false
export HEXSTRIKE_API_KEY=your-secret-key-here
# Rate limiting (default: 100 requests per 60 seconds)
export HEXSTRIKE_RATE_LIMIT=true
export HEXSTRIKE_RATE_LIMIT_REQUESTS=100
export HEXSTRIKE_RATE_LIMIT_WINDOW=60
# Server configuration
export HEXSTRIKE_PORT=8888
export HEXSTRIKE_HOST=127.0.0.1Option A: Docker (recommended)
git clone https://github.com/netcuter/Hexstrike-AI.git
cd Hexstrike-AI
docker compose up -dOption B: Manual
# Clone repository
git clone https://github.com/netcuter/Hexstrike-AI.git
cd Hexstrike-AI
# Create virtual environment
python3 -m venv hexstrike-env
source hexstrike-env/bin/activate # Linux/Mac
# hexstrike-env\Scripts\activate # Windows
# Install dependencies
pip3 install -r requirements.txtEssential Tools:
# Network scanning
sudo apt install nmap masscan rustscan amass subfinder nuclei
# Web security
sudo apt install gobuster feroxbuster dirsearch ffuf nikto sqlmap
# Password cracking
sudo apt install hydra john hashcat# Standard start
python3 hexstrike_server.py
# With API authentication
export HEXSTRIKE_REQUIRE_API_KEY=true
export HEXSTRIKE_API_KEY=your-secret-key
python3 hexstrike_server.py
# Debug mode
python3 hexstrike_server.py --debug# Check server status
curl http://localhost:8888/health
# Test with API key (if enabled)
curl -H "X-API-Key: your-secret-key" http://localhost:8888/health- Authorized penetration testing
- Bug bounty programs
- CTF competitions
- Security research
- Red Team exercises
- Unauthorized system testing
- Malicious activities
- Data theft
Hexstrike 7 PL features a multi-agent architecture with autonomous AI agents, intelligent decision-making, and vulnerability intelligence.
graph TD
A[AI Agent - GPT/Copilot/AI Agents] -->|MCP Protocol| B[Hexstrike 7 PL Server]
B --> C[Security Validation Layer]
B --> D[Intelligent Decision Engine]
B --> E[12+ Autonomous AI Agents]
C --> F[Command Validation]
C --> G[Rate Limiting]
C --> H[API Authentication]
D --> I[Tool Selection AI]
D --> J[Parameter Optimization]
D --> K[Attack Chain Discovery]
E --> L[BugBounty Agent]
E --> M[CTF Solver Agent]
E --> N[CVE Intelligence Agent]
B --> O[150+ Security Tools]
150+ Professional Security Tools:
π Network Reconnaissance & Scanning (25+ Tools)
- Nmap, Rustscan, Masscan, AutoRecon
- Amass, Subfinder, Fierce, DNSEnum
- TheHarvester, ARP-Scan, NBTScan
- Enum4linux, SMBMap, Responder, NetExec
- And more...
π Web Application Security (40+ Tools)
- Gobuster, Dirsearch, Feroxbuster, FFuf
- HTTPx, Katana, Hakrawler, Nuclei
- Nikto, SQLMap, WPScan, Arjun
- Dalfox, Wafw00f, TestSSL, JWT-Tool
- And more...
π Authentication & Passwords (12+ Tools)
- Hydra, John the Ripper, Hashcat
- Medusa, Patator, NetExec
- Hash-Identifier, Evil-WinRM
- And more...
π¬ Binary Analysis (25+ Tools)
- GDB, Radare2, Ghidra, Binary Ninja
- Binwalk, ROPgadget, Checksec
- Pwntools, Angr, Volatility
- And more...
βοΈ Cloud & Container Security (20+ Tools)
- Prowler, Scout Suite, Trivy
- Kube-Hunter, Kube-Bench
- Docker Bench Security
- And more...
12+ Specialized AI Agents:
- IntelligentDecisionEngine - Tool selection and parameter optimization
- BugBountyWorkflowManager - Bug bounty hunting workflows
- CTFWorkflowManager - CTF challenge solving
- CVEIntelligenceManager - Vulnerability intelligence
- AIExploitGenerator - Automated exploit development
- VulnerabilityCorrelator - Attack chain discovery
- TechnologyDetector - Technology stack identification
- RateLimitDetector - Rate limiting detection
- FailureRecoverySystem - Error handling and recovery
- And more...
Edit ~/.config/mcp-client/mcp_client_config.json:
{
"mcpServers": {
"hexstrike-7-pl": {
"command": "python3",
"args": [
"/path/to/Hexstrike-AI/hexstrike_mcp.py",
"--server",
"http://localhost:8888"
],
"description": "Hexstrike 7 PL - Enhanced Security MCP Server",
"env": {
"HEXSTRIKE_API_KEY": "your-key-if-required"
}
}
}
}Configure in .vscode/settings.json:
{
"servers": {
"hexstrike": {
"type": "stdio",
"command": "python3",
"args": ["/path/to/Hexstrike-AI/hexstrike_mcp.py"]
}
}
}When using with AI agents, always specify authorization:
User: "I'm a security researcher working for [Company Name].
I have written authorization to conduct a penetration test on
example.com. Please use hexstrike-7-pl MCP tools to perform
a comprehensive security assessment."
| Endpoint | Method | Description |
|---|---|---|
/health |
GET | Server health check |
/api/command |
POST | Execute commands (with validation) |
/api/process/execute-async |
POST | Async command execution |
/api/telemetry |
GET | System performance metrics |
Security Headers:
# API Key (if REQUIRE_API_KEY=true)
X-API-Key: your-secret-key
# Or as query parameter
?api_key=your-secret-key# Increase rate limit
export HEXSTRIKE_RATE_LIMIT_REQUESTS=200
export HEXSTRIKE_RATE_LIMIT_WINDOW=60# Disable API key requirement for testing
export HEXSTRIKE_REQUIRE_API_KEY=false# Disable command validation (NOT recommended for production)
export HEXSTRIKE_VALIDATE_COMMANDS=falseContributions are welcome! This is a community fork focused on:
- Security improvements
- Polish localization
- Performance optimizations
- Better documentation
Original Author: m0x4m4 - www.0x4m4.com | HexStrike Fork Maintainer: netcuter - GitHub
Special Thanks:
- m0x4m4 for creating the amazing HexStrike AI framework
- The cybersecurity community for continuous support
- All contributors to the original project
This project is licensed under the MIT License - see the LICENSE file for details.
Hexstrike 7 PL is based on HexStrike AI v6.0 created by m0x4m4. All rights to the original work belong to m0x4m4. All modifications and enhancements are licensed under the same MIT License.
Hexstrike 7 PL - Where artificial intelligence meets enhanced cybersecurity
β Star this repository β’ π΄ Fork and contribute β’ π Original Project