AI Powered penetration testing Platform for offensive security research
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"nyxstrike": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
⭐ If NyxStrike improves your workflow, consider starring the repo — it helps others discover it.
This server supports HTTP transport. Be the first to test it — help the community know if it works.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in data
Manage Supabase projects — databases, auth, storage, and edge functions
Query and manage PostgreSQL databases directly from AI assistants
MCPSDK.dev(ToolSDK.ai)'s Awesome MCP Servers and Packages Registry and Database with Structured JSON configurations. Supports OAuth2.1, DCR...
An MCP server that securely interfaces with your iMessage database via the Model Context Protocol (MCP), allowing LLMs to query and analyze iMessage conversations. It includes robust phone number validation, attachment processing, contact management, group chat handling, and full support for sending and receiving messages.
MCP Security Weekly
Get CVE alerts and security updates for Nyxstrike and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Previously: Hexstrike AI Community Edition
⭐ If NyxStrike improves your workflow, consider starring the repo — it helps others discover it.
NyxStrike connects LLM agents to real offensive security tools and executes full attack chains — from recon to exploitation.
Get a full offensive security environment running in minutes.
git clone https://github.com/CommonHuman-Lab/nyxstrike.git
cd nyxstrike
./nyxstrike.sh -a # Setup + start server
./nyxstrike.sh -a -ai # + local AI model (~8.4 GB RAM)
./nyxstrike.sh -a -ai-small # + smaller AI model (~2.5 GB RAM)
Full flag reference: Wiki — Installation & Flags
Open http://localhost:8888 to access the dashboard.
Some tools (e.g.
nmap,masscan) require elevated privileges for specific scan modes. Use a dedicated test VM and least-privilege setup where possible.
Connect NyxStrike to any MCP-compatible AI client — OpenCode, Cursor, Claude Desktop, VS Code Copilot, Roo Code, and more.
/path/to/nyxstrike/nyxstrike-env/bin/python3 \
/path/to/nyxstrike/nyxstrike_mcp.py \
--server http://127.0.0.1:8888 \
--profile full
{
"$schema": "https://opencode.ai/config.json",
"mcp": {
"nyxstrike": {
"type": "local",
"command": [
"/path/to/nyxstrike/nyxstrike-env/bin/python3",
"/path/to/nyxstrike/nyxstrike_mcp.py",
"--server",
"http://127.0.0.1:8888",
"--profile",
"full"
],
"enabled": true
}
}
}
Config snippets for Claude Desktop, Cursor, VS Code Copilot, and security options: Wiki — MCP Setup
NyxStrike does not just run tools — it orchestrates full attack chains using AI decision-making.
185+ offensive security tools across 12 categories — all dynamically orchestrated by AI agents in real time.
NyxStrike gives AI agents direct access to offensive security tooling.
NYXSTRIKE_API_TOKEN for any non-local deployment