Previously: Hexstrike AI Community Edition
⭐ If NyxStrike improves your workflow, consider starring the repo — it helps others discover it.
NyxStrike connects LLM agents to real offensive security tools and executes full attack chains — from recon to exploitation.
Get a full offensive security environment running in minutes.
git clone https://github.com/CommonHuman-Lab/nyxstrike.git
cd nyxstrike
./nyxstrike.sh -a # Setup + start server
./nyxstrike.sh -a -ai # + local AI model (~8.4 GB RAM)
./nyxstrike.sh -a -ai-small # + smaller AI model (~2.5 GB RAM)Full flag reference: Wiki — Installation & Flags
Open http://localhost:8888 to access the dashboard.
Some tools (e.g.
nmap,masscan) require elevated privileges for specific scan modes. Use a dedicated test VM and least-privilege setup where possible.
Connect NyxStrike to any MCP-compatible AI client — OpenCode, Cursor, Claude Desktop, VS Code Copilot, Roo Code, and more.
/path/to/nyxstrike/nyxstrike-env/bin/python3 \
/path/to/nyxstrike/nyxstrike_mcp.py \
--server http://127.0.0.1:8888 \
--profile full{
"$schema": "https://opencode.ai/config.json",
"mcp": {
"nyxstrike": {
"type": "local",
"command": [
"/path/to/nyxstrike/nyxstrike-env/bin/python3",
"/path/to/nyxstrike/nyxstrike_mcp.py",
"--server",
"http://127.0.0.1:8888",
"--profile",
"full"
],
"enabled": true
}
}
}Config snippets for Claude Desktop, Cursor, VS Code Copilot, and security options: Wiki — MCP Setup
NyxStrike does not just run tools — it orchestrates full attack chains using AI decision-making.
- AI agents that chain tools automatically
- 185+ offensive security tools, all agent-controllable
- Full attack workflow: recon → enumeration → exploitation → reporting
- Modular tool registry — add or remove tools without touching agent logic
- MCP-compatible — plug into any AI client you already use
- Real-time session dashboard with live command output and logs
185+ offensive security tools across 12 categories — all dynamically orchestrated by AI agents in real time.
- Network reconnaissance
- Web exploitation
- Wireless security
- OSINT & intelligence gathering
- Password attacks
- Cloud & API security
NyxStrike gives AI agents direct access to offensive security tooling.
- Run only in isolated environments or dedicated security testing VMs
- AI agents may execute real commands — maintain operator oversight
- Monitor activity via dashboard and logs in real time
- Use
NYXSTRIKE_API_TOKENfor any non-local deployment
| Allowed | Not Allowed |
|---|---|
| Authorized penetration testing (with written authorization) | Unauthorized testing of any system |
| Bug bounty programs (within program scope and rules) | Malicious, illegal, or harmful activities |
| CTF competitions and educational environments | Unauthorized data access or exfiltration |
| Security research on owned or authorized systems | |
| Red team exercises (with organizational approval) |
Licensed under the AGPLv3. You are free to use, modify, and distribute this software. If you run it as a service or distribute it, the source must remain open.
For commercial licensing, contact the author.
If NyxStrike is useful to your workflow:
- Star the repository
- Share it with others
- Contribute improvements
It makes a real difference.
Originally inspired by hexstrike-ai.