Hexstrike-redteam

by Yenn503 · MCP Server · ★ 44

About Hexstrike-redteam

AI-powered MCP penetration testing framework combining HexStrike's 150+ security tools with BOAZ's advanced payload evasion (77+ loaders, 12 encoders). Features 12+ autonomous AI agents for bug bounty, CTF, CVE intelligence, exploit generation, and red team operations.

Quick Facts

Stars44
Forks8
LanguageC++
CategoryMCP Server
Quality Score28.3/100
Last Updated2025-11-27
Created2025-10-17
Platformsmcp
Est. Tokens~4490k

More MCP Server Tools

Explore other popular mcp server tools:

View all MCP Server tools →

Popular C++ Agent Tools

Frequently Asked Questions

What is Hexstrike-redteam?

Hexstrike-redteam is AI-powered MCP penetration testing framework combining HexStrike's 150+ security tools with BOAZ's advanced payload evasion (77+ loaders, 12 encoders). Features 12+ autonomous AI agents for bug bounty. It is categorized as a MCP Server with 44 GitHub stars.

What programming language is Hexstrike-redteam written in?

Hexstrike-redteam is primarily written in C++.

How do I install or use Hexstrike-redteam?

You can find installation instructions and usage details in the Hexstrike-redteam GitHub repository at github.com/Yenn503/Hexstrike-redteam. The project has 44 stars and 8 forks, indicating an active community.

View on GitHub → Browse MCP Server tools