19 articles · AI-driven pentesting · All authorized labs

HexStrike

AI-driven penetration testing framework. All articles, guides, and lab walkthroughs for HexStrike-AI — from initial setup to advanced attack scenarios.

Getting Started

3 articles
Install, Configure & Run MCP
AI-driven setup MCP

Complete install guide: MCP server setup, model configuration (Gemini/OpenAI/Ollama/Llama), and first run.

Force Multiplier for Red Teams
AI-driven red team

What HexStrike does, threat model implications, and how it changes the offensive security workflow.

HexStrike + Gemini vs. HackerAI
AI-driven comparison

Comparative analysis: architecture, autonomy level, tool coverage, and practical use case fit.

AI Backend Integration

4 articles
Shodan + HexStrike via Gemini-CLI
AI-driven Shodan Gemini

Shodan API wiring into HexStrike MCP context for automated exposure-aware recon.

MCP Orchestration with Ollama
AI-driven Ollama local LLM

Air-gapped setup: Ollama local LLM, SSH tool routing from Ubuntu to Kali, performance benchmarks.

HexStrike + OpenAI Codex
AI-driven OpenAI exploitation

OpenAI Codex as the reasoning backend; full Metasploitable exploitation walkthrough.

HackerAI Predecessor Walkthrough
AI-driven HackerAI Metasploitable

HackerAI (predecessor) walkthrough; comparison with HexStrike MCP approach.

Network & Infrastructure Attacks

4 articles
Full Network Discovery & Exploitation
AI-driven network home lab

Home lab network sweep: host discovery → service enum → vulnerability scan → exploitation chain.

HexStrike + Cursor: Full Subnet Compromise
AI-driven Cursor pivot

Cursor IDE + HexStrike MCP: autonomous pivot from one compromised host to full subnet control.

AI-Assisted SSH Brute-Force
AI-driven Gemini brute-force

Gemini-guided wordlist selection and SSH brute-force with real-time result interpretation.

AI-Assisted SMB Credential Brute-Force
AI-driven Gemini SMB

SMB share enumeration + credential attack with AI-driven result analysis and next-step suggestions.

Web Application & Cloud

2 articles
AI-Driven Web App Pentesting
AI-driven web

HexStrike-driven web app attack: parameter fuzzing, injection detection, and automated report generation.

HexStrike + Burp Suite MCP
AI-driven Cursor cloud web

Multi-MCP setup: HexStrike + Burp Suite both as MCP servers under Cursor AI orchestration.

Password Recovery

3 articles
AI-Driven ZIP Password Recovery
AI-driven Gemini-CLI cracking

Gemini-CLI + HexStrike ZIP cracking: intelligent wordlist mutation based on target context.

AI-Driven Office Document Password Recovery
AI-driven Gemini-CLI cracking

DOCX/XLSX/PPT hash extraction + AI-guided recovery for Office encrypted documents.

AI-Driven PDF Password Recovery
AI-driven Gemini-CLI cracking

PDF hash extraction and AI-assisted cracking with Gemini wordlist optimization.

Advanced Scenarios

3 articles
OSINT: Email to Full Exposure Map
AI-driven Cursor OSINT

Email → domain → infrastructure → exposure graph: automated OSINT pivot chain.

Fully Automated ADCS ESC8 Attack
AI-driven Cursor ADCS ESC8

End-to-end ADCS ESC8 exploitation: NTLM relay setup → certificate request → domain compromise, fully AI-orchestrated.

Vulnerable Ubuntu Lab + Full PT
AI-driven Linux exploitation

Lab setup + full pentest walkthrough: HexStrike against the vulnerable Ubuntu target from zero to root.