nyxstrike
by CommonHuman-Lab·★ 96·Score 47
AI-powered offensive security orchestration engine with MCP integration for automated penetration testing.
Overview
NyxStrike connects LLM agents to real offensive security tools and executes full attack chains from reconnaissance to exploitation. It provides a modular tool registry with 185+ security tools that can be controlled by AI agents in real-time. The platform features a dashboard for monitoring and logging all activities during penetration testing sessions.
Try asking AI
After installing, here are 5 things you can ask your AI assistant:
When to choose this
Security researchers and penetration testers looking to automate attack chains with AI-driven tool orchestration in controlled environments.
When NOT to choose this
Users without proper security expertise or isolated environments, as NyxStrike gives AI direct access to offensive tools requiring specialized handling.
Comparable tools
Installation
Installation
git clone https://github.com/CommonHuman-Lab/nyxstrike.git
cd nyxstrike
./nyxstrike.sh -a # Setup + start server
./nyxstrike.sh -a -ai # + local AI model (~8.4 GB RAM)
./nyxstrike.sh -a -ai-small # + smaller AI model (~2.5 GB RAM)Claude Desktop Configuration
{
"$schema": "https://schemas claude.ai/desktop-config.json",
"mcpServers": {
"nyxstrike": {
"command": [
"/path/to/nyxstrike/nyxstrike-env/bin/python3",
"/path/to/nyxstrike/nyxstrike_mcp.py",
"--server",
"http://127.0.0.1:8888",
"--profile",
"full"
],
"env": {}
}
}
}FAQ
- What is NyxStrike?
- NyxStrike is an AI-powered offensive security orchestration engine that connects LLM agents to real security tools and executes full attack chains from reconnaissance to exploitation.
- Is NyxStrike legal to use?
- NyxStrike should only be used for authorized penetration testing, bug bounty programs, CTF competitions, security research on owned systems, and red team exercises with proper approval.
Compare nyxstrike with
Last updated · Auto-generated from public README + GitHub signals.