/ الدليل / الملعب / hexstrike-ai
● مجتمع 0x4m4 ⚡ فوري

hexstrike-ai

بواسطة 0x4m4 · 0x4m4/hexstrike-ai

150+ cybersecurity tools with 12+ AI agents — automated pentesting, vulnerability scanning, and security research via MCP.

HexStrike AI is an MCP server integrating 150+ professional security tools with 12+ autonomous AI agents. Covers network scanning (Nmap, Masscan), web testing (Nuclei, SQLMap, Nikto), password cracking (Hydra, Hashcat), binary analysis (Radare2, Ghidra), cloud security (Prowler, Trivy), OSINT (Shodan, SpiderFoot), and CTF/forensics (Volatility, Steghide). Includes a real-time dashboard for monitoring.

لماذا تستخدمه

الميزات الأساسية

عرض مباشر

كيف يبدو في الممارسة

hexstrike-ai.replay ▶ جاهز
0/0

التثبيت

اختر العميل

~/Library/Application Support/Claude/claude_desktop_config.json  · Windows: %APPDATA%\Claude\claude_desktop_config.json
{
  "mcpServers": {
    "hexstrike-ai": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/0x4m4/hexstrike-ai"
      ]
    }
  }
}

افتح Claude Desktop → Settings → Developer → Edit Config. أعد التشغيل بعد الحفظ.

~/.cursor/mcp.json · .cursor/mcp.json
{
  "mcpServers": {
    "hexstrike-ai": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/0x4m4/hexstrike-ai"
      ]
    }
  }
}

يستخدم Cursor نفس مخطط mcpServers مثل Claude Desktop. إعدادات المشروع أولى من الإعدادات العامة.

VS Code → Cline → MCP Servers → Edit
{
  "mcpServers": {
    "hexstrike-ai": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/0x4m4/hexstrike-ai"
      ]
    }
  }
}

انقر على أيقونة MCP Servers في شريط Cline الجانبي، ثم "Edit Configuration".

~/.codeium/windsurf/mcp_config.json
{
  "mcpServers": {
    "hexstrike-ai": {
      "command": "TODO",
      "args": [
        "See README: https://github.com/0x4m4/hexstrike-ai"
      ]
    }
  }
}

نفس الصيغة مثل Claude Desktop. أعد تشغيل Windsurf لتطبيق التغييرات.

~/.continue/config.json
{
  "mcpServers": [
    {
      "name": "hexstrike-ai",
      "command": "TODO",
      "args": [
        "See README: https://github.com/0x4m4/hexstrike-ai"
      ]
    }
  ]
}

يستخدم Continue مصفوفة من كائنات الخادم بدلاً من خريطة.

~/.config/zed/settings.json
{
  "context_servers": {
    "hexstrike-ai": {
      "command": {
        "path": "TODO",
        "args": [
          "See README: https://github.com/0x4m4/hexstrike-ai"
        ]
      }
    }
  }
}

أضف إلى context_servers. يعيد Zed التحميل تلقائيًا عند الحفظ.

claude mcp add hexstrike-ai -- TODO 'See README: https://github.com/0x4m4/hexstrike-ai'

أمر من سطر واحد. تحقق باستخدام claude mcp list. احذف باستخدام claude mcp remove.

حالات الاستخدام

استخدامات عملية: hexstrike-ai

How to solve a multi-stage CTF challenge with HexStrike AI

👤 CTF participants working on security challenges ⏱ ~60 min intermediate

متى تستخدمه: You have a CTF target and need to enumerate, scan, and exploit in a structured way.

المتطلبات الأساسية
  • HexStrike AI installed in a sandboxed environment — Clone and pip install in a VM or container
  • Target is a CTF challenge you are authorized to test — Only use on CTF platforms or labs you have permission to test
الخطوات
  1. Reconnaissance
    Run an Nmap scan on the CTF target at 10.10.10.1. Identify open ports and services.✓ تم النسخ
    → Port scan results with service versions
  2. Web enumeration
    The target has a web server on port 80. Run Gobuster for directory enumeration and Nikto for vulnerability scanning.✓ تم النسخ
    → Discovered directories and potential vulnerabilities
  3. Exploitation assistance
    Found a login page at /admin. Run Hydra with the top-1000 passwords list against it.✓ تم النسخ
    → Login attempt results

النتيجة: Systematic enumeration and exploitation path for the CTF challenge.

المزالق
  • Running aggressive scans that crash the CTF target — Use moderate scan speeds and timing options (Nmap -T3 instead of -T5)
اجمعها مع: filesystem

Perform an authorized web application security assessment

👤 Security professionals with written authorization to test a web application ⏱ ~120 min advanced

متى تستخدمه: You have a signed agreement to test a client's web application.

المتطلبات الأساسية
  • Written authorization for the target — Signed penetration testing agreement from the target owner
  • HexStrike AI configured — Install and configure in an isolated environment
الخطوات
  1. Vulnerability scanning
    Run Nuclei against https://target.example.com with default templates. Focus on critical and high severity findings.✓ تم النسخ
    → List of discovered vulnerabilities with severity ratings
  2. SQL injection testing
    Test the login endpoint for SQL injection using SQLMap.✓ تم النسخ
    → SQLMap results showing injectable parameters or confirming the endpoint is secure

النتيجة: A documented list of vulnerabilities found during authorized testing.

المزالق
  • Testing outside the agreed scope — Always reference your authorization document. Only test explicitly listed assets.
اجمعها مع: filesystem

التركيبات

اجمعها مع خوادم MCP أخرى لتحقيق نتائج x10

hexstrike-ai + filesystem

Save scan results and generate a penetration testing report

Run a full assessment on the target, save all results, and generate a professional pentest report as a markdown file.✓ تم النسخ

الأدوات

ما يوفره هذا الـ MCP

الأداةالمدخلاتمتى تستدعيهاالتكلفة
nmap_scan target: str, options?: str Network port scanning and service detection 0
nuclei_scan target: str, templates?: str Automated vulnerability scanning with templates 0
sqlmap_test url: str, params?: str SQL injection detection and exploitation testing 0
gobuster_dir url: str, wordlist?: str Directory and file brute-force enumeration 0
hydra_attack target: str, service: str, userlist?: str, passlist?: str Password brute-force testing on services 0

التكلفة والحدود

تكلفة التشغيل

حصة API
N/A — all tools run locally
الرموز لكل استدعاء
500–3000 tokens per scan result
التكلفة المالية
Free — all tools are open source. Some tools (Shodan) need their own API keys.
نصيحة
Run targeted scans instead of full-spectrum sweeps to reduce noise and time.

الأمان

الصلاحيات والأسرار ونطاق الأثر

تخزين بيانات الاعتماد: Individual tool API keys (Shodan, etc.) in environment variables
نقل البيانات الخارجي: Network scans connect to target systems. OSINT tools call their respective APIs.

استكشاف الأخطاء

الأخطاء الشائعة وحلولها

Tool not found / command not available

Many tools must be installed separately on your system. Install them via your package manager (apt, brew) or from source.

تحقق: which nmap && which nuclei && which sqlmap
Scan timeout

Reduce scan scope or increase timeout. Use -T3 for Nmap instead of default timing.

تحقق: Try a simple ping or single-port scan first
Permission denied on scan

Some scans (SYN scan) require root. Run with sudo or switch to a less privileged scan type.

تحقق: sudo nmap -sS target

البدائل

hexstrike-ai مقابل البدائل

البديلمتى تستخدمهاالمقايضة
mcp-security-hubYou want Dockerized security tools with better isolation and CI/CD integrationBetter containerization but may require more setup
mcp-kali-serverYou want a lightweight API bridge to a full Kali Linux installationFull Kali toolkit but less AI agent specialization

المزيد

الموارد

📖 اقرأ ملف README الرسمي على GitHub

🐙 تصفح القضايا المفتوحة

🔍 تصفح أكثر من 400 خادم MCP و Skills