Security Agents
Cyberstrike includes specialized agents optimized for different security assessment scenarios. Each agent has domain-specific knowledge, methodologies, and tool configurations.
π¬ GIF: g05-agent-switch.gif
Agent deΔiΕtirme demosu (12s)
πΈ SCREENSHOT: s09-agent-select.png
Agent seΓ§im dialogu
π DIAGRAM: agent-selection-flow.mermaid
Agent seΓ§im akΔ±Ε diyagramΔ±
Available Agents
| Agent | Purpose | Primary Tools |
|---|---|---|
web-application | Web app security testing | Browser, Nuclei, SQLMap |
cloud-security | Cloud infrastructure auditing | AWS CLI, Prowler, ScoutSuite |
internal-network | Network penetration testing | Nmap, Impacket, BloodHound |
bug-hunter | Bug bounty reconnaissance | Subfinder, GAU, ffuf |
Selecting an Agent
Command Line
# Start with specific agentcyberstrike --agent web-application
# One-time run with agentcyberstrike run --agent cloud-security "audit AWS account"Interactive Mode
Press Tab or use the agent selector to switch agents during a session.
Configuration
Set a default agent in cyberstrike.json:
{ "default_agent": "web-application"}Web Application Agent
The web-application agent specializes in OWASP-based web security testing with integrated browser automation.
Capabilities
- OWASP Top 10 vulnerability detection
- OWASP Web Security Testing Guide (WSTG) methodology
- Interactive browser-based testing with traffic capture
- Injection attack testing (SQLi, XSS, XXE, SSTI)
- Authentication and authorization bypass
- Session management analysis
- Business logic flaw detection
Browser Integration
The agent uses an integrated browser with DevTools access:
browser launch # Start browser with traffic capturebrowser navigate url="..." # Navigate to targetbrowser network # View captured HTTP trafficbrowser har # Export HAR filebrowser screenshot # Capture evidencebrowser execute script="..."# Run JavaScriptbrowser close # Close browserTesting Methodology
The agent follows the WSTG checklist:
- WSTG-INFO: Information Gathering (10 tests)
- WSTG-CONF: Configuration Testing (13 tests)
- WSTG-IDNT: Identity Management (5 tests)
- WSTG-ATHN: Authentication Testing (11 tests)
- WSTG-AUTHZ: Authorization Testing (7 tests)
- WSTG-SESS: Session Management (11 tests)
- WSTG-INPV: Input Validation (29 tests)
- WSTG-ERRH: Error Handling (2 tests)
- WSTG-CRYP: Cryptography (4 tests)
- WSTG-BUSL: Business Logic (10 tests)
- WSTG-CLNT: Client-side (14 tests)
- WSTG-APIT: API Testing (4 tests)
Tools
- Browser Tool: Interactive testing with full traffic capture
- Nuclei: Automated vulnerability scanning
- SQLMap: SQL injection testing
- FFUF: Directory and parameter fuzzing
- Nikto: Web server scanning
- curl: Manual HTTP requests
Example Session
cyberstrike --agent web-application
> Launch the browser and navigate to https://target.com> Capture all login traffic and test for authentication bypass> Check for SQL injection in the search parameter> Export HAR file for evidenceFinding Output Format
WSTG-ID: WSTG-INPV-05Title: SQL Injection in Login FormSeverity: High (CVSS 8.6)CWE: CWE-89Evidence: Request/Response capturedRemediation: Use parameterized queriesCloud Security Agent
The cloud-security agent audits AWS, Azure, and GCP environments against security benchmarks.
Capabilities
- AWS security assessment (IAM, S3, EC2, Lambda, RDS)
- Azure security review (AD, Blob Storage, RBAC, Key Vault)
- GCP security analysis (IAM, GCS, Compute, Cloud Functions)
- CIS Benchmarks compliance checking
- Cloud misconfiguration detection
- Privilege escalation path identification
Methodology
- Enumeration: Identify cloud resources and configurations
- IAM Analysis: Review policies, roles, and permissions
- Storage Security: Check bucket/blob permissions
- Network Security: Review security groups and firewalls
- Secrets Management: Identify exposed credentials
- Logging and Monitoring: Verify audit configurations
- Compliance: Check against CIS benchmarks
Key Checks
AWS
| Check | Description |
|---|---|
| S3 Public Access | Detect publicly accessible buckets |
| IAM Over-Permissions | Identify overly permissive policies |
| EC2 Metadata | Check IMDS v1 exposure |
| Lambda Permissions | Review function execution roles |
| RDS Accessibility | Verify database isolation |
| CloudTrail Status | Confirm audit logging |
Azure
| Check | Description |
|---|---|
| Blob Anonymous Access | Detect public containers |
| RBAC Misconfig | Review role assignments |
| Key Vault Access | Analyze access policies |
| NSG Rules | Check network security groups |
| Conditional Access | Review Azure AD policies |
GCP
| Check | Description |
|---|---|
| GCS Bucket ACLs | Check storage permissions |
| IAM Bindings | Review member permissions |
| Service Accounts | Analyze compute identities |
| VPC Firewall | Review firewall rules |
| Cloud Functions | Check function permissions |
Tools
- Prowler: AWS/Azure/GCP security assessment
- ScoutSuite: Multi-cloud auditing
- PACU: AWS exploitation framework
- CloudSploit: Configuration scanning
- aws-cli, az-cli, gcloud: Manual checks
Example Session
cyberstrike --agent cloud-security
> Enumerate all S3 buckets and check for public access> Review IAM policies for overly permissive permissions> Check CloudTrail logging configuration> Run CIS Benchmark assessment with ProwlerFinding Output Format
Cloud Provider: AWSService: S3Issue: Public bucket access enabledSeverity: Critical (CVSS 9.0)CIS Benchmark: CIS AWS 2.1.1Evidence: Bucket policy allows s3:GetObject to *Remediation: Enable S3 Block Public AccessInternal Network Agent
The internal-network agent performs network penetration testing and Active Directory attacks.
Capabilities
- Network enumeration and service discovery
- Active Directory security testing
- Kerberos attacks (Kerberoasting, AS-REP Roasting)
- Credential attacks (Password Spraying, Pass-the-Hash)
- Lateral movement techniques
- Privilege escalation (Windows, Linux, Domain)
- Persistence mechanism analysis
Methodology
1. Network Reconnaissance
- Port scanning and service enumeration
- Banner grabbing and version detection
- Network topology mapping
2. Active Directory Enumeration
- Domain information gathering
- User and group discovery
- Trust relationship mapping
- GPO analysis
- ACL abuse path identification
3. Credential Attacks
- Kerberoasting
- AS-REP Roasting
- Password spraying
- NTLM relay attacks
4. Lateral Movement
- Pass-the-Hash
- Pass-the-Ticket
- DCOM/WMI execution
- PSExec/WinRM
5. Privilege Escalation
- Local admin to domain admin paths
- Unconstrained delegation abuse
- Resource-based constrained delegation
- AD CS certificate attacks
Attack Paths
LLMNR/NBT-NS Poisoning β NTLMv2 Hash CaptureKerberoasting β Service Account PasswordsAS-REP Roasting β User Passwords without PreauthBloodHound Analysis β Domain Admin PathGPO Abuse β Code Execution on Domain MachinesAD CS β Certificates for Domain AuthenticationTools
- Nmap: Network scanning and enumeration
- BloodHound: AD relationship mapping
- NetExec: Network exploitation
- Kerbrute: Kerberos enumeration
- Impacket: Protocol attacks
- Responder: LLMNR/NBT-NS poisoning
- Mimikatz: Credential extraction
Example Session
cyberstrike --agent internal-network
> Scan the 10.0.0.0/24 network for live hosts> Enumerate Active Directory users and groups> Run Kerberoasting attack against service accounts> Identify BloodHound paths to Domain AdminFinding Output Format
Attack Vector: KerberoastingTarget: SVC_SQL service accountSeverity: High (CVSS 7.5)MITRE ATT&CK: T1558.003Evidence: TGS hash captured, password crackedImpact: Direct path to domain compromiseRemediation: Use MSAs, enforce complex passwordsBug Hunter Agent
The bug-hunter agent focuses on reconnaissance and vulnerability hunting for bug bounty programs.
Capabilities
- Attack surface discovery
- Subdomain enumeration (passive and active)
- Historical data analysis (Wayback, GAU)
- JavaScript endpoint extraction
- Secret detection in code
- Business logic vulnerability hunting
- Vulnerability chaining strategies
Methodology
1. Asset Discovery
- Subdomain enumeration (passive + active)
- Port scanning on discovered hosts
- Technology fingerprinting
- Content discovery
2. Historical Analysis
- Wayback Machine archives
- GetAllURLs (GAU)
- Historical DNS records
- Certificate transparency logs
3. JavaScript Analysis
- Endpoint extraction
- API key discovery
- Secret detection
- Hidden functionality
4. Vulnerability Hunting
- IDOR on identified endpoints
- Authentication bypass
- Access control issues
- Business logic flaws
- Rate limiting bypass
- Subdomain takeover
5. Impact Amplification
- Chain vulnerabilities
- Demonstrate business impact
- Write clear PoC
- Calculate accurate CVSS
Reconnaissance Flow
Domain βββ Subdomain Enum (subfinder, amass) β βββ DNS Resolution β βββ HTTP Probing (httpx) β βββ Technology Fingerprint β βββ Nuclei Scan βββ Historical URLs (gau, wayback) β βββ Parameter Discovery β βββ SQLi/XSS Testing βββ JavaScript Analysis βββ Endpoint Extraction βββ API TestingTools
- Subfinder, Amass: Subdomain enumeration
- Httpx: HTTP probing
- Nuclei: Vulnerability scanning
- GAU, Waybackurls: Historical URL discovery
- LinkFinder, SecretFinder: JavaScript analysis
- ffuf: Fuzzing
- Shodan: Passive reconnaissance
Example Session
cyberstrike --agent bug-hunter
> Enumerate subdomains for target.com> Probe discovered hosts with httpx> Run nuclei templates on live hosts> Extract endpoints from JavaScript files> Check for subdomain takeover opportunitiesFinding Output Format
Program: target-security (HackerOne)Asset: api.target.comVulnerability: IDOR in user profile endpointSeverity: High (CVSS 7.5)Impact: Access to any user's PIIPoC: GET /api/users/12345 with modified user IDBusiness Impact: GDPR violation, data breach riskCreating Custom Agents
Create custom agents by adding markdown files to .cyberstrike/agents/:
---description: API security testing specialistmodel: anthropic/claude-opus-4-20250514mode: primarycolor: "#00FF88"steps: 100---
You are an API security specialist focusing on:- REST API security testing- GraphQL vulnerability assessment- OAuth/OIDC implementation review- Rate limiting and abuse prevention- API versioning security
## Methodology1. API discovery and documentation review2. Authentication mechanism analysis3. Authorization testing (BOLA, BFLA)4. Input validation testing5. Rate limiting assessmentAgent Configuration Options
| Option | Type | Description |
|---|---|---|
description | string | Agent description for selection |
model | string | Override model for this agent |
mode | string | βprimaryβ or βsubagentβ |
color | string | Hex color for UI (#RRGGBB) |
steps | number | Maximum iterations |
temperature | number | Model temperature (0-1) |
Agent Switching
Switch between agents during a session:
Keyboard Shortcuts
| Shortcut | Action |
|---|---|
Tab | Next agent |
Shift+Tab | Previous agent |
<leader>a | Agent list |
Slash Command
/agent web-applicationInline Mention
@web-application scan the login form for vulnerabilitiesInfo
Agents can be customized per-project by placing configuration files in the .cyberstrike/agents/ directory.