Cyberstrike is now open source! AI-powered penetration testing for security professionals. Star on GitHub


Quick Start

Works everywhere

Run security assessments from your terminal. CLI, TUI, Web, and IDE integrations available.

Get started in minutes

1

Install Cyberstrike

One command to install. Works on macOS, Linux, and Windows with WSL.

2

Add Your API Keys

Bring your own keys from Anthropic, OpenAI, or Google. Full control over your AI costs.

3

Start Hacking

Point Cyberstrike at your target and let the AI agent do the reconnaissance and exploitation.

best value
Features

Everything you need for security testing

Cyberstrike combines the power of multiple AI models with battle-tested security tools.

Multi-Model AI

Access Claude, GPT-4, Gemini, Ollama, and more. Switch between providers seamlessly with unified interface.

Automated Scanning

Comprehensive vulnerability scanning for web apps, APIs, and infrastructure with zero configuration.

BYOK Model

Use your own API keys. Full control over costs and data privacy. No vendor lock-in.

Detailed Reports

Generate professional pentest reports in PDF, Markdown, or HTML with remediation guidance.

CLI & TUI

Powerful terminal interface with both CLI for scripting and TUI for interactive sessions.

Fully Extensible

Fork it, customize it, add your own tools. AGPL-3.0 licensed, community-driven development.

Battle-tested

Trusted by security professionals

100+

Security tools integrated

5+

AI models supported

AGPL

Licensed & open source

Community contributions

See it in action

Watch Cyberstrike Find Vulnerabilities

Feature Snapshot

Connect all our contacts

Sync with your calendar apps and contacts. Google, Outlook, ProtonMail, and more.

Dashboards for all businesses

Lorem ipsum dolor sit amet consectetur adipisicing elit. Fugit totam delectus rerum, reiciendis quisquam cum sunt.

Synced to the cloud

Your data is accessible from everywhere, syncing across all your devices.

Your business intelligence, simplified

Lorem ipsum dolor sit amet consectetur adipisicing elit. Fugit totam delectus rerum.

Real-time insights at your fingertips

Data syncs across your team instantly. Real-time access, with 99.9% uptime.

Connects to popular apps

Lorem ipsum dolor sit amet consectetur adipisicing elit. Fugit totam delectus rerum, reiciendis quisquam cum sunt.

100+ MCP Tools

All your pentesting tools, AI-powered

Nmap

SQLMap

Nikto

Burp Suite

Nuclei

Hydra

Metasploit

Wireshark

Hashcat

John

FFUF

Amass

AWS CLI

Azure CLI

GCloud

Playwright

Gobuster

Aircrack

Responder

Impacket

Subfinder

BloodHound

CrackMapExec

Custom MCPs

AI Agents

Autonomous Offensive Agents

Five specialized AI agents handle different attack vectors: Cloud Security for AWS/Azure/GCP, Internal Network for lateral movement, Red Team for advanced persistent threats, Web Application for OWASP vulnerabilities, and Bug Hunter for bug bounty hunting.

Autonomous Offensive Agents
Open Source

Extensible MCP Architecture

Built on the Model Context Protocol (MCP), Cyberstrike supports 100+ security tools out of the box. Easily extend with custom MCP servers for your specific pentesting workflow - from Nmap to Metasploit to custom scripts.

Extensible MCP Architecture

5 AI Agents

Cloud Security, Internal Network, Red Team, Web Application, and Bug Hunter agents - each specialized for different attack vectors.

Kali MCP Tools

Full integration with nmap, sqlmap, nikto, and 100+ Kali Linux tools via Model Context Protocol.

BYOK Model

Bring your own API keys from OpenAI, Anthropic, or Google. Full control over costs and data privacy.