Works everywhere
Run security assessments from your terminal. CLI, TUI, Web, and IDE integrations available.
Get started in minutes
Install Cyberstrike
One command to install. Works on macOS, Linux, and Windows with WSL.
Add Your API Keys
Bring your own keys from Anthropic, OpenAI, or Google. Full control over your AI costs.
Start Hacking
Point Cyberstrike at your target and let the AI agent do the reconnaissance and exploitation.

Everything you need for security testing
Cyberstrike combines the power of multiple AI models with battle-tested security tools.
Multi-Model AI
Access Claude, GPT-4, Gemini, Ollama, and more. Switch between providers seamlessly with unified interface.
Automated Scanning
Comprehensive vulnerability scanning for web apps, APIs, and infrastructure with zero configuration.
BYOK Model
Use your own API keys. Full control over costs and data privacy. No vendor lock-in.
Detailed Reports
Generate professional pentest reports in PDF, Markdown, or HTML with remediation guidance.
CLI & TUI
Powerful terminal interface with both CLI for scripting and TUI for interactive sessions.
Fully Extensible
Fork it, customize it, add your own tools. AGPL-3.0 licensed, community-driven development.
Trusted by security professionals
100+
Security tools integrated
5+
AI models supported
AGPL
Licensed & open source
∞
Community contributions
Watch Cyberstrike Find Vulnerabilities
Feature Snapshot
Connect all our contacts
Sync with your calendar apps and contacts. Google, Outlook, ProtonMail, and more.
Dashboards for all businesses
Lorem ipsum dolor sit amet consectetur adipisicing elit. Fugit totam delectus rerum, reiciendis quisquam cum sunt.
Synced to the cloud
Your data is accessible from everywhere, syncing across all your devices.
Your business intelligence, simplified
Lorem ipsum dolor sit amet consectetur adipisicing elit. Fugit totam delectus rerum.
Real-time insights at your fingertips
Data syncs across your team instantly. Real-time access, with 99.9% uptime.
Connects to popular apps
Lorem ipsum dolor sit amet consectetur adipisicing elit. Fugit totam delectus rerum, reiciendis quisquam cum sunt.
All your pentesting tools, AI-powered
Nmap
SQLMap
Nikto
Burp Suite
Nuclei
Hydra
Metasploit
Wireshark
Hashcat
John
FFUF
Amass
AWS CLI
Azure CLI
GCloud
Playwright
Gobuster
Aircrack
Responder
Impacket
Subfinder
BloodHound
CrackMapExec
Custom MCPs
Autonomous Offensive Agents
Five specialized AI agents handle different attack vectors: Cloud Security for AWS/Azure/GCP, Internal Network for lateral movement, Red Team for advanced persistent threats, Web Application for OWASP vulnerabilities, and Bug Hunter for bug bounty hunting.

Extensible MCP Architecture
Built on the Model Context Protocol (MCP), Cyberstrike supports 100+ security tools out of the box. Easily extend with custom MCP servers for your specific pentesting workflow - from Nmap to Metasploit to custom scripts.

5 AI Agents
Cloud Security, Internal Network, Red Team, Web Application, and Bug Hunter agents - each specialized for different attack vectors.
Kali MCP Tools
Full integration with nmap, sqlmap, nikto, and 100+ Kali Linux tools via Model Context Protocol.
BYOK Model
Bring your own API keys from OpenAI, Anthropic, or Google. Full control over costs and data privacy.