CYBERSTRIKE(1)

NAME

CyberStrikeAI-powered offensive security agent. Autonomous pentesting with 13+ specialized agents, 120+ OWASP test cases, 15+ LLM…

SYNOPSIS

$brew install CyberStrikeus/tap/cyberstrike

INFO

157 stars
29 forks
0 views

DESCRIPTION

AI-powered offensive security agent. Autonomous pentesting with 13+ specialized agents, 120+ OWASP test cases, 15+ LLM providers, and Bolt remote tool servers. Your AI red team.

README

English | 简体中文 | 繁體中文 | 한국어 | Deutsch | Español | Français | Italiano | Dansk | 日本語 | Polski | Русский | Bosanski | العربية | Norsk | Português (Brasil) | ไทย | Türkçe | Українська | বাংলা | Ελληνικά | Tiếng Việt | हिन्दी

CyberStrike

The first open-source AI agent built for offensive security.

Automated penetration testing from your terminal — plug in your Claude, GPT, or any LLM subscription
and turn it into an autonomous red team agent with 13+ specialized agents and 120+ OWASP test cases.

Quick StartIntelligence LayerWhat Makes It DifferentAgentsBoltMCP EcosystemInstallationDocsWebsite

npm Downloads Build Discord License


Quick Start

npm i -g @cyberstrike-io/cyberstrike@latest && cyberstrike

That's it. CyberStrike launches a TUI in your terminal, asks for your LLM provider and API key on first run, and you're ready to go. Tell it what to test — it handles reconnaissance, vulnerability discovery, exploitation, and reporting autonomously.

Already have a Claude Code or OpenAI subscription? CyberStrike's intelligence layer sits on top of your existing AI subscription. No separate API costs — your current plan powers an entire pentest toolkit.

Explore the full documentation at docs.cyberstrike.io or visit cyberstrike.io for demos and guides.


Intelligence Layer

CyberStrike isn't just a wrapper around an LLM. It's an intelligence layer that transforms any AI model into an offensive security specialist.

How it works: When you connect your LLM provider, CyberStrike injects domain-specific context — OWASP testing methodology, vulnerability patterns, attack chain reasoning, and tool orchestration logic — into every interaction. The model doesn't need to know security; CyberStrike teaches it.

What the intelligence layer provides:

  • Schema normalization — Structured output from any provider, regardless of response format differences
  • Context guard — Prevents prompt leakage and keeps the agent focused on the current test phase
  • Provider auto-detection — Automatically identifies your LLM endpoint and configures the optimal transport
  • Tool orchestration — Chains security tools intelligently based on findings, not fixed scripts

15+ LLM providers supported out of the box:

ProviderModelsNotes
AnthropicClaude 4.5, Claude 4Best performance with extended thinking
OpenAIGPT-4.1, o3, o4-miniFull tool-use support
GoogleGemini 2.5 Pro/FlashLong context for large codebases
Amazon BedrockAll Bedrock modelsIAM auth, no API keys needed
Azure OpenAIAll Azure-hosted modelsEnterprise deployments
GroqLLaMA, MixtralUltra-fast inference
MistralMistral Large, CodestralEuropean data residency
DeepSeekDeepSeek V3, R1Cost-effective alternative
OpenRouter100+ modelsSingle API, any model
Together AIOpen-source modelsFine-tuning support
OllamaAny GGUF modelFully offline, local-only
LM StudioAny local modelDesktop GUI + API server
vLLMAny HuggingFace modelSelf-hosted, GPU-optimized
Any OpenAI-compatibleCustom endpoints welcome

Air-gapped environments? Run CyberStrike entirely offline with Ollama or LM Studio. No data leaves your machine — ever.


What Makes It Different

Specialized Security Agents, Not Generic Chat

CyberStrike ships with 13+ agents purpose-built for security domains. Each agent carries domain-specific methodology, tool knowledge, and testing patterns. The web-application agent follows OWASP WSTG. The cloud-security agent knows CIS benchmarks. The mobile agent uses Frida and follows MASTG/MASVS. They don't guess — they follow proven offensive security frameworks.

Intelligence Layer, Not Just an LLM Wrapper

Most AI security tools are thin wrappers that send your prompt to an API. CyberStrike's intelligence layer normalizes outputs across 15+ providers, guards context between test phases, auto-detects your provider configuration, and orchestrates multi-step attack chains. The result: consistent, methodology-driven pentesting regardless of which model you use.

Any LLM, Zero Lock-in

Anthropic, OpenAI, Google, Amazon Bedrock, Azure, Groq, Mistral, DeepSeek, OpenRouter, Together AI — or run fully offline with Ollama and LM Studio. You choose the model. You own the results. As AI models get better and cheaper, CyberStrike gets better with them. Switch providers in seconds without reconfiguring anything.

Remote Tool Execution with Bolt

Your security tools don't have to run on your laptop. Deploy Bolt on one or many remote servers, pair with Ed25519 keys, and control everything from your local terminal. One CyberStrike instance can orchestrate dozens of Bolt servers — each with its own toolkit, network position, and attack surface access.


Agents

Switch between agents with Tab. Each one is a domain specialist.

AgentFocusWhat It Does
cyberstrikeGeneralFull-access primary agent — reconnaissance, exploitation, reporting
web-applicationWebOWASP Top 10, WSTG methodology, API security, session testing
mobile-applicationMobileAndroid/iOS, Frida/Objection, MASTG/MASVS compliance
cloud-securityCloudAWS, Azure, GCP — IAM misconfigs, CIS benchmarks, exposed resources
internal-networkNetworkActive Directory, Kerberos attacks, lateral movement, pivoting

Plus 8 specialized proxy testers that intercept and manipulate traffic for targeted vulnerability classes:

IDOR · Authorization Bypass · Mass Assignment · Injection · Authentication · Business Logic · SSRF · File Attacks

Each proxy tester follows a structured methodology: intercept traffic, identify patterns, generate test cases, execute attacks, and report findings with evidence.


Bolt — Remote Tool Execution

Bolt is CyberStrike's remote tool server. Deploy it on any VPS, cloud instance, or Docker container — then control it from your local terminal over MCP protocol with Ed25519 authentication.

One CyberStrike, many Bolt servers:

                                          ┌─────────────────────┐
                                     ┌───►│  Bolt Server #1     │
                                     │    │  nmap, nuclei, ffuf  │
┌──────────────────┐   MCP + Ed25519 │    └─────────────────────┘
│  Your Terminal   │   over HTTPS    │    ┌─────────────────────┐
│  CyberStrike TUI │ ◄─────────────►├───►│  Bolt Server #2     │
│                  │   Tool Results   │    │  sqlmap, burp, zap   │
└──────────────────┘                 │    └─────────────────────┘
                                     │    ┌─────────────────────┐
                                     └───►│  Bolt Server #3     │
                                          │  Custom toolkit      │
                                          └─────────────────────┘
  • Deploy anywhere — VPS, Docker, Kubernetes, or bare metal with pre-built Kali images
  • Ed25519 key pairing — No passwords, no shared secrets, no attack surface
  • Real-time streaming — Results flow back to your TUI as they happen
  • Manage from TUI — Add, remove, and monitor Bolt servers without leaving CyberStrike
  • Scale horizontally — Run heavy scans from servers with better bandwidth while you work locally

MCP Ecosystem

CyberStrike connects to specialized MCP servers that extend its capabilities — 176+ security tools across 5 domains:

ServerToolsWhat It Adds
hackbrowser-mcp39Browser-based security testing — XSS, CSRF, DOM manipulation, cookie theft
cloud-audit-mcp38Cloud security audits — 60+ checks across AWS, Azure, GCP
github-security-mcp39GitHub security posture — repo, org, actions, secrets, supply chain
cve-mcp23CVE intelligence — NVD, EPSS, CISA KEV, GitHub Advisory, OSV
osint-mcp37OSINT recon — Shodan, VirusTotal, SecurityTrails, Censys, DNS, WHOIS

All open source. All installable with npx. Plug them into CyberStrike or use them standalone with any MCP-compatible client.


Built-in Tools

CyberStrike agents have direct access to 30+ tools without any external dependencies:

CategoryTools
ExecutionShell (bash), file read/write/edit, directory listing
DiscoveryWeb fetch, web search, code search, glob, grep
SecurityVulnerability reporting (HackerOne format), evidence collection
ProxyHTTP/HTTPS interception, request replay, traffic analysis
IntegrationMCP servers, Bolt remote tools, custom plugins

Plus a plugin SDK — build your own agents and tools, register them at runtime.


Installation

# npm (recommended)
npm i -g @cyberstrike-io/cyberstrike@latest

bun / pnpm / yarn

bun add -g @cyberstrike-io/cyberstrike@latest

macOS (Homebrew)

brew install CyberStrikeus/tap/cyberstrike

Windows (Scoop)

scoop install cyberstrike

Linux / macOS (curl)

curl -fsSL https://cyberstrike.io/install | bash

Desktop app (macOS, Windows, Linux) — built with Tauri for native performance:

brew install --cask cyberstrike-desktop          # macOS
scoop bucket add extras; scoop install extras/cyberstrike-desktop  # Windows

Or download directly from the releases page.


Who Is This For?

  • Pentesters — Automate the repetitive parts. Let agents handle recon and initial testing while you focus on the creative attack chains that need human intuition.
  • Bug Bounty Hunters — Faster reconnaissance, wider coverage, consistent methodology across programs. CyberStrike doesn't get tired at 3am.
  • Security Teams — Run structured OWASP assessments with reproducible methodology. Get reports that map to standards your compliance team understands.
  • Security Researchers — Extend CyberStrike with custom agents and MCP servers. The plugin system and MCP protocol make it a platform, not just a tool.

Contributing

CyberStrike is built by the security community, for the security community. We welcome contributions across:

  • Security agents and skills — New attack methodologies, testing patterns, vulnerability detection
  • MCP servers — Connect new security tools and data sources
  • Knowledge base — WSTG, MASTG, PTES, CIS methodology guides
  • Core improvements — Performance, UX, provider integrations, bug fixes

Read the Contributing Guide before submitting a PR. All contributions must follow the project's ethical use policy — CyberStrike is for authorized security testing only.


License

AGPL-3.0-only — Free for personal and open-source use. Commercial licensing available via contact@cyberstrike.io.


MCP Security Suite

CyberStrike is the core platform. These MCP servers extend its capabilities:

ProjectDomainTools
CyberStrikeAutonomous offensive security agent13+ agents, 120+ OWASP test cases
hackbrowser-mcpBrowser-based security testing39 tools, Firefox, injection testing
cloud-audit-mcpCloud security (AWS/Azure/GCP)38 tools, 60+ checks
github-security-mcpGitHub security posture39 tools, 45 checks
cve-mcpVulnerability intelligence23 tools, 5 sources
osint-mcpOSINT & reconnaissance37 tools, 12 sources

cyberstrike.io · Docs · Discord · X.com · GitHub

Built by hackers who got tired of copy-pasting between terminals.

SEE ALSO

clihub3/22/2026CYBERSTRIKE(1)