返回顶部
h

hexstrike

Cybersecurity assistant for CTF challenges, penetration testing, network recon, vulnerability assessment, and security research. Use when: (1) solving CTF challenges (web, crypto, pwn, forensics, rev, OSINT, misc), (2) performing network reconnaissance or port scanning, (3) web application security testing, (4) vulnerability scanning and assessment, (5) binary analysis or reverse engineering, (6) password cracking or hash identification, (7) forensics analysis (file, memory, network, steganograp

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
99
下载量
0
收藏
概述
安装方式
版本历史

hexstrike

# HexStrike — Cybersecurity & CTF Skill ## Overview Execute security tools directly via `exec`. No middleware, no MCP server — direct CLI access to 150+ security tools with methodology-driven workflows. ## First Step: Check Available Tools Before starting any engagement, run the tool checker to see what's installed: ```bash bash scripts/tool-check.sh # All categories bash scripts/tool-check.sh network # Just network tools bash scripts/tool-check.sh web # Just web tools ``` Adapt the workflow to available tools. If a preferred tool is missing, suggest installation or use alternatives. ## CTF Workflow When given a CTF challenge: 1. **Identify category** from description/files (web, crypto, pwn, forensics, rev, misc, OSINT) 2. **Read** `references/ctf-playbook.md` for the matching category section 3. **Triage** — run quick identification commands before heavy tools 4. **Iterate** — CTF is exploratory; try the obvious first, escalate to specialized tools 5. **Document findings** as you go — note promising leads ### Category Identification Hints | Indicators | Category | |-----------|----------| | URL, web app, login page, cookies | **web** | | Ciphertext, hash, encoded data, RSA, AES | **crypto** | | Binary file, ELF, PE, segfault, nc connection | **pwn** | | Image file, pcap, memory dump, disk image | **forensics** | | Binary to analyze, "what does this do", crackme | **rev** | | Username, location, social media, domain | **OSINT** | | Encoding, QR code, audio file, esoteric | **misc** | ## Recon / Pentest Workflow For reconnaissance or penetration testing engagements: 1. **Read** `references/recon-methodology.md` for the full phased approach 2. **Phase 1**: Passive recon (subdomains, DNS, WHOIS, certificate transparency) 3. **Phase 2**: Active recon (port scanning, service enumeration) 4. **Phase 3**: Vulnerability scanning (nuclei, nikto, nmap scripts) 5. **Phase 4**: Web app testing (directory brute-force, injection testing) 6. **Phase 5**: Credential attacks (only when authorized) ## Tool Reference For quick syntax lookup on any of the 80+ tools, read `references/tool-reference.md`. ## Execution Guidelines ### Output Handling - Pipe long outputs to files: `nmap ... -oA /tmp/nmap_results` - Use `| head -50` or `| tail -20` for initial review - Save important results: `> /tmp/<tool>_<target>_results.txt` ### Safety - **Never run offensive tools against targets without explicit authorization** - Default to non-invasive scans first (passive recon, version detection) - Escalate to active testing only when confirmed authorized - Use `--batch` flags where available to avoid interactive prompts (e.g., sqlmap) - Set reasonable timeouts and rate limits to avoid disruption ### Tool Installation If critical tools are missing, suggest install commands: - **Debian/Ubuntu**: `sudo apt install <package>` - **pip tools**: `pip3 install <package>` - **Go tools**: `go install <repo>@latest` - **Kali Linux**: Most tools pre-installed; `sudo apt install kali-tools-*` for categories ### Long-Running Scans Use `exec` with `background: true` and `yieldMs` for scans that take minutes: ``` exec: nmap -sV -sC -p- <TARGET> -oA /tmp/full_scan background: true, yieldMs: 30000 ``` Check progress with `process(action=poll)`.

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 hexstrike-1775938448 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 hexstrike-1775938448 技能

通过命令行安装

skillhub install hexstrike-1775938448

下载 Zip 包

⬇ 下载 hexstrike v1.0.0

文件大小: 11.96 KB | 发布时间: 2026-4-12 10:11

v1.0.0 最新 2026-4-12 10:11
HexStrike 1.0.0 — Initial release

- Launches a cybersecurity assistant for CTF, pentesting, recon, binary analysis, forensics, cloud security, and more.
- Enables direct CLI access to 150+ security tools with methodology-driven workflows and no middleware.
- Provides structured guidance for CTF challenges, including category identification and tool usage methodologies.
- Includes phased reconnaissance and penetration testing workflow, with tool usage and output management advice.
- Offers quick syntax lookup by referencing curated documentation for 80+ tools.
- Emphasizes safety, authorization, and non-invasive best practices for tool execution.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部