Content
<div align="center">
<img src="assets/nyxstrike-logo.png" alt="NyxStrike" width="220"/>
# NyxStrike
*Previously: Hexstrike AI Community Edition*
### AI-powered offensive security orchestration engine
### ⚡ From target → recon → exploit chain in minutes
⭐ If NyxStrike improves your workflow, consider starring the repo — it helps others discover it.
[](https://www.python.org/)
[](LICENSE)
[](https://github.com/CommonHuman-Lab/nyxstrike)
[](https://github.com/CommonHuman-Lab/nyxstrike)
</div>
## What is NyxStrike?
NyxStrike connects LLM agents to real offensive security tools and executes full attack chains — from recon to exploitation.
---
## 🚀 Quick Start (Installation)
> Get a full offensive security environment running in minutes.
```bash
git clone https://github.com/CommonHuman-Lab/nyxstrike.git
cd nyxstrike
./nyxstrike.sh -a # Setup + start server
./nyxstrike.sh -a -ai # + local AI model (~8.4 GB RAM)
./nyxstrike.sh -a -ai-small # + smaller AI model (~2.5 GB RAM)
```
> Full flag reference: [Wiki — Installation & Flags](https://github.com/CommonHuman-Lab/nyxstrike/wiki/Installation-and-Flags)
### Verify Setup
Open [http://localhost:8888](http://localhost:8888) to access the dashboard.
> Some tools (e.g. `nmap`, `masscan`) require elevated privileges for specific scan modes. Use a dedicated test VM and least-privilege setup where possible.
---
## 🔌 AI Agent Integrations (MCP)
Connect NyxStrike to any MCP-compatible AI client — OpenCode, Cursor, Claude Desktop, VS Code Copilot, Roo Code, and more.
### Universal MCP Command
```bash
/path/to/nyxstrike/nyxstrike-env/bin/python3 \
/path/to/nyxstrike/nyxstrike_mcp.py \
--server http://127.0.0.1:8888 \
--profile full
```
### OpenCode
```json
{
"$schema": "https://opencode.ai/config.json",
"mcp": {
"nyxstrike": {
"type": "local",
"command": [
"/path/to/nyxstrike/nyxstrike-env/bin/python3",
"/path/to/nyxstrike/nyxstrike_mcp.py",
"--server",
"http://127.0.0.1:8888",
"--profile",
"full"
],
"enabled": true
}
}
}
```
> Config snippets for Claude Desktop, Cursor, VS Code Copilot, and security options: [Wiki — MCP Setup](https://github.com/CommonHuman-Lab/nyxstrike/wiki/MCP-Setup)
---
## 🔧 Features
NyxStrike does not just run tools — it orchestrates full attack chains using AI decision-making.
- AI agents that chain tools automatically
- 185+ offensive security tools, all agent-controllable
- Full attack workflow: recon → enumeration → exploitation → reporting
- Modular tool registry — add or remove tools without touching agent logic
- MCP-compatible — plug into any AI client you already use
- Real-time session dashboard with live command output and logs
> [Full feature breakdown](https://github.com/CommonHuman-Lab/nyxstrike/wiki/Features) · [Session & workbench docs](https://github.com/CommonHuman-Lab/nyxstrike/wiki/Dashboard-and-Sessions)
---
## 🧰 Tool Arsenal
185+ offensive security tools across 12 categories — all dynamically orchestrated by AI agents in real time.
- Network reconnaissance
- Web exploitation
- Wireless security
- OSINT & intelligence gathering
- Password attacks
- Cloud & API security
> [Full tool list by category](https://github.com/CommonHuman-Lab/nyxstrike/wiki/Tool-Arsenal)
---
## ⚠️ Security Considerations
> NyxStrike gives AI agents direct access to offensive security tooling.
- Run only in isolated environments or dedicated security testing VMs
- AI agents may execute real commands — maintain operator oversight
- Monitor activity via dashboard and logs in real time
- Use `NYXSTRIKE_API_TOKEN` for any non-local deployment
### Legal & Ethical Use
| Allowed | Not Allowed |
|---|---|
| Authorized penetration testing (with written authorization) | Unauthorized testing of any system |
| Bug bounty programs (within program scope and rules) | Malicious, illegal, or harmful activities |
| CTF competitions and educational environments | Unauthorized data access or exfiltration |
| Security research on owned or authorized systems | |
| Red team exercises (with organizational approval) | |
---
## 📜 License
Licensed under the [AGPLv3](LICENSE).
You are free to use, modify, and distribute this software. If you run it as a service or distribute it, the source must remain open.
For commercial licensing, contact the author.
---
## ⭐ Support the project
If NyxStrike is useful to your workflow:
- Star the repository
- Share it with others
- Contribute improvements
It makes a real difference.
---
## Credits
Originally inspired by [hexstrike-ai](https://github.com/0x4m4/hexstrike-ai).
MCP Config
Below is the configuration for this MCP Server. You can copy it directly to Cursor or other MCP clients.
mcp.json
Connection Info
You Might Also Like
everything-claude-code
Complete Claude Code configuration collection - agents, skills, hooks,...
markitdown
MarkItDown-MCP is a lightweight server for converting URIs to Markdown.
servers
Model Context Protocol Servers
servers
Model Context Protocol Servers
cc-switch
All-in-One Assistant for Claude Code, Codex & Gemini CLI across platforms.
Time
A Model Context Protocol server for time and timezone conversions.