Hexstrike
Cybersecurity assistant for CTF challenges, penetration testing, network recon, vulnerability assessment, and security research. Use when: (1) solving CTF ch...
Like a lobster shell, security has layers — review code before you run it.
License
SKILL.md
HexStrike — Cybersecurity & CTF Skill
Overview
Execute security tools directly via exec. No middleware, no MCP server — direct CLI access to 150+ security tools with methodology-driven workflows.
First Step: Check Available Tools
Before starting any engagement, run the tool checker to see what's installed:
bash scripts/tool-check.sh # All categories
bash scripts/tool-check.sh network # Just network tools
bash scripts/tool-check.sh web # Just web tools
Adapt the workflow to available tools. If a preferred tool is missing, suggest installation or use alternatives.
CTF Workflow
When given a CTF challenge:
- Identify category from description/files (web, crypto, pwn, forensics, rev, misc, OSINT)
- Read
references/ctf-playbook.mdfor the matching category section - Triage — run quick identification commands before heavy tools
- Iterate — CTF is exploratory; try the obvious first, escalate to specialized tools
- Document findings as you go — note promising leads
Category Identification Hints
| Indicators | Category |
|---|---|
| URL, web app, login page, cookies | web |
| Ciphertext, hash, encoded data, RSA, AES | crypto |
| Binary file, ELF, PE, segfault, nc connection | pwn |
| Image file, pcap, memory dump, disk image | forensics |
| Binary to analyze, "what does this do", crackme | rev |
| Username, location, social media, domain | OSINT |
| Encoding, QR code, audio file, esoteric | misc |
Recon / Pentest Workflow
For reconnaissance or penetration testing engagements:
- Read
references/recon-methodology.mdfor the full phased approach - Phase 1: Passive recon (subdomains, DNS, WHOIS, certificate transparency)
- Phase 2: Active recon (port scanning, service enumeration)
- Phase 3: Vulnerability scanning (nuclei, nikto, nmap scripts)
- Phase 4: Web app testing (directory brute-force, injection testing)
- Phase 5: Credential attacks (only when authorized)
Tool Reference
For quick syntax lookup on any of the 80+ tools, read references/tool-reference.md.
Execution Guidelines
Output Handling
- Pipe long outputs to files:
nmap ... -oA /tmp/nmap_results - Use
| head -50or| tail -20for initial review - Save important results:
> /tmp/<tool>_<target>_results.txt
Safety
- Never run offensive tools against targets without explicit authorization
- Default to non-invasive scans first (passive recon, version detection)
- Escalate to active testing only when confirmed authorized
- Use
--batchflags where available to avoid interactive prompts (e.g., sqlmap) - Set reasonable timeouts and rate limits to avoid disruption
Tool Installation
If critical tools are missing, suggest install commands:
- Debian/Ubuntu:
sudo apt install <package> - pip tools:
pip3 install <package> - Go tools:
go install <repo>@latest - Kali Linux: Most tools pre-installed;
sudo apt install kali-tools-*for categories
Long-Running Scans
Use exec with background: true and yieldMs for scans that take minutes:
exec: nmap -sV -sC -p- <TARGET> -oA /tmp/full_scan
background: true, yieldMs: 30000
Check progress with process(action=poll).
Files
5 totalComments
Loading comments…
