Getting Started
3 articlesComplete install guide: MCP server setup, model configuration (Gemini/OpenAI/Ollama/Llama), and first run.
What HexStrike does, threat model implications, and how it changes the offensive security workflow.
Comparative analysis: architecture, autonomy level, tool coverage, and practical use case fit.
AI Backend Integration
4 articlesShodan API wiring into HexStrike MCP context for automated exposure-aware recon.
Air-gapped setup: Ollama local LLM, SSH tool routing from Ubuntu to Kali, performance benchmarks.
OpenAI Codex as the reasoning backend; full Metasploitable exploitation walkthrough.
HackerAI (predecessor) walkthrough; comparison with HexStrike MCP approach.
Network & Infrastructure Attacks
4 articlesHome lab network sweep: host discovery → service enum → vulnerability scan → exploitation chain.
Cursor IDE + HexStrike MCP: autonomous pivot from one compromised host to full subnet control.
Gemini-guided wordlist selection and SSH brute-force with real-time result interpretation.
SMB share enumeration + credential attack with AI-driven result analysis and next-step suggestions.
Web Application & Cloud
2 articlesHexStrike-driven web app attack: parameter fuzzing, injection detection, and automated report generation.
Multi-MCP setup: HexStrike + Burp Suite both as MCP servers under Cursor AI orchestration.
Password Recovery
3 articlesGemini-CLI + HexStrike ZIP cracking: intelligent wordlist mutation based on target context.
DOCX/XLSX/PPT hash extraction + AI-guided recovery for Office encrypted documents.
PDF hash extraction and AI-assisted cracking with Gemini wordlist optimization.
Advanced Scenarios
3 articlesEmail → domain → infrastructure → exposure graph: automated OSINT pivot chain.
End-to-end ADCS ESC8 exploitation: NTLM relay setup → certificate request → domain compromise, fully AI-orchestrated.
Lab setup + full pentest walkthrough: HexStrike against the vulnerable Ubuntu target from zero to root.