Security Agents
Cyberstrike includes specialized agents optimized for different security assessment scenarios. Each agent has domain-specific knowledge, methodologies, and tool configurations.
🎬 GIF: g05-agent-switch.gif
Agent deÄźiĹźtirme demosu (12s)
📸 SCREENSHOT: s09-agent-select.png
Agent seçim dialogu
📊 DIAGRAM: agent-selection-flow.mermaid
Agent seçim akış diyagramı
Available Agents
Primary Agents
Primary agents are user-facing and manage full sessions. They can delegate to specialized subagents when needed.
| Agent | Purpose | Mode |
|---|---|---|
cyberstrike | Default general-purpose offensive security agent with full tool access | Primary (default) |
web-application | Web app security testing with OWASP WSTG methodology | Subagent |
cloud-security | Cloud infrastructure auditing against CIS Benchmarks | Subagent |
internal-network | Network penetration testing and Active Directory attacks | Subagent |
proxy-agent | HTTP proxy-based vulnerability testing orchestrator | Subagent |
Selecting an Agent
Command Line
# Start with specific agentcyberstrike --agent web-application
# One-time run with agentcyberstrike run --agent cloud-security "audit AWS account"Interactive Mode
Press Tab or use the agent selector to switch agents during a session.
Configuration
Set a default agent in cyberstrike.json:
{ "default_agent": "web-application"}Web Application Agent
The web-application agent specializes in OWASP-based web security testing with integrated browser automation.
Capabilities
- OWASP Top 10 vulnerability detection
- OWASP Web Security Testing Guide (WSTG) methodology
- Interactive browser-based testing with traffic capture
- Injection attack testing (SQLi, XSS, XXE, SSTI)
- Authentication and authorization bypass
- Session management analysis
- Business logic flaw detection
Browser Integration
The agent uses an integrated browser with DevTools access:
browser launch # Start browser with traffic capturebrowser navigate url="..." # Navigate to targetbrowser network # View captured HTTP trafficbrowser har # Export HAR filebrowser screenshot # Capture evidencebrowser execute script="..."# Run JavaScriptbrowser close # Close browserTesting Methodology
The agent follows the WSTG checklist:
- WSTG-INFO: Information Gathering (10 tests)
- WSTG-CONF: Configuration Testing (13 tests)
- WSTG-IDNT: Identity Management (5 tests)
- WSTG-ATHN: Authentication Testing (11 tests)
- WSTG-AUTHZ: Authorization Testing (7 tests)
- WSTG-SESS: Session Management (11 tests)
- WSTG-INPV: Input Validation (29 tests)
- WSTG-ERRH: Error Handling (2 tests)
- WSTG-CRYP: Cryptography (4 tests)
- WSTG-BUSL: Business Logic (10 tests)
- WSTG-CLNT: Client-side (14 tests)
- WSTG-APIT: API Testing (4 tests)
Tools
- Browser Tool: Interactive testing with full traffic capture
- Nuclei: Automated vulnerability scanning
- SQLMap: SQL injection testing
- FFUF: Directory and parameter fuzzing
- Nikto: Web server scanning
- curl: Manual HTTP requests
Example Session
cyberstrike --agent web-application
> Launch the browser and navigate to https://target.com> Capture all login traffic and test for authentication bypass> Check for SQL injection in the search parameter> Export HAR file for evidenceFinding Output Format
WSTG-ID: WSTG-INPV-05Title: SQL Injection in Login FormSeverity: High (CVSS 8.6)CWE: CWE-89Evidence: Request/Response capturedRemediation: Use parameterized queriesCloud Security Agent
The cloud-security agent audits AWS, Azure, and GCP environments against security benchmarks.
Capabilities
- AWS security assessment (IAM, S3, EC2, Lambda, RDS)
- Azure security review (AD, Blob Storage, RBAC, Key Vault)
- GCP security analysis (IAM, GCS, Compute, Cloud Functions)
- CIS Benchmarks compliance checking
- Cloud misconfiguration detection
- Privilege escalation path identification
Methodology
- Enumeration: Identify cloud resources and configurations
- IAM Analysis: Review policies, roles, and permissions
- Storage Security: Check bucket/blob permissions
- Network Security: Review security groups and firewalls
- Secrets Management: Identify exposed credentials
- Logging and Monitoring: Verify audit configurations
- Compliance: Check against CIS benchmarks
Key Checks
AWS
| Check | Description |
|---|---|
| S3 Public Access | Detect publicly accessible buckets |
| IAM Over-Permissions | Identify overly permissive policies |
| EC2 Metadata | Check IMDS v1 exposure |
| Lambda Permissions | Review function execution roles |
| RDS Accessibility | Verify database isolation |
| CloudTrail Status | Confirm audit logging |
Azure
| Check | Description |
|---|---|
| Blob Anonymous Access | Detect public containers |
| RBAC Misconfig | Review role assignments |
| Key Vault Access | Analyze access policies |
| NSG Rules | Check network security groups |
| Conditional Access | Review Azure AD policies |
GCP
| Check | Description |
|---|---|
| GCS Bucket ACLs | Check storage permissions |
| IAM Bindings | Review member permissions |
| Service Accounts | Analyze compute identities |
| VPC Firewall | Review firewall rules |
| Cloud Functions | Check function permissions |
Tools
- Prowler: AWS/Azure/GCP security assessment
- ScoutSuite: Multi-cloud auditing
- PACU: AWS exploitation framework
- CloudSploit: Configuration scanning
- aws-cli, az-cli, gcloud: Manual checks
Example Session
cyberstrike --agent cloud-security
> Enumerate all S3 buckets and check for public access> Review IAM policies for overly permissive permissions> Check CloudTrail logging configuration> Run CIS Benchmark assessment with ProwlerFinding Output Format
Cloud Provider: AWSService: S3Issue: Public bucket access enabledSeverity: Critical (CVSS 9.0)CIS Benchmark: CIS AWS 2.1.1Evidence: Bucket policy allows s3:GetObject to *Remediation: Enable S3 Block Public AccessInternal Network Agent
The internal-network agent performs network penetration testing and Active Directory attacks.
Capabilities
- Network enumeration and service discovery
- Active Directory security testing
- Kerberos attacks (Kerberoasting, AS-REP Roasting)
- Credential attacks (Password Spraying, Pass-the-Hash)
- Lateral movement techniques
- Privilege escalation (Windows, Linux, Domain)
- Persistence mechanism analysis
Methodology
1. Network Reconnaissance
- Port scanning and service enumeration
- Banner grabbing and version detection
- Network topology mapping
2. Active Directory Enumeration
- Domain information gathering
- User and group discovery
- Trust relationship mapping
- GPO analysis
- ACL abuse path identification
3. Credential Attacks
- Kerberoasting
- AS-REP Roasting
- Password spraying
- NTLM relay attacks
4. Lateral Movement
- Pass-the-Hash
- Pass-the-Ticket
- DCOM/WMI execution
- PSExec/WinRM
5. Privilege Escalation
- Local admin to domain admin paths
- Unconstrained delegation abuse
- Resource-based constrained delegation
- AD CS certificate attacks
Attack Paths
LLMNR/NBT-NS Poisoning → NTLMv2 Hash CaptureKerberoasting → Service Account PasswordsAS-REP Roasting → User Passwords without PreauthBloodHound Analysis → Domain Admin PathGPO Abuse → Code Execution on Domain MachinesAD CS → Certificates for Domain AuthenticationTools
- Nmap: Network scanning and enumeration
- BloodHound: AD relationship mapping
- NetExec: Network exploitation
- Kerbrute: Kerberos enumeration
- Impacket: Protocol attacks
- Responder: LLMNR/NBT-NS poisoning
- Mimikatz: Credential extraction
Example Session
cyberstrike --agent internal-network
> Scan the 10.0.0.0/24 network for live hosts> Enumerate Active Directory users and groups> Run Kerberoasting attack against service accounts> Identify BloodHound paths to Domain AdminFinding Output Format
Attack Vector: KerberoastingTarget: SVC_SQL service accountSeverity: High (CVSS 7.5)MITRE ATT&CK: T1558.003Evidence: TGS hash captured, password crackedImpact: Direct path to domain compromiseRemediation: Use MSAs, enforce complex passwordsCreating Custom Agents
Create custom agents by adding markdown files to .cyberstrike/agents/:
---description: API security testing specialistmodel: anthropic/claude-opus-4-20250514mode: primarycolor: "#00FF88"steps: 100---
You are an API security specialist focusing on:- REST API security testing- GraphQL vulnerability assessment- OAuth/OIDC implementation review- Rate limiting and abuse prevention- API versioning security
## Methodology1. API discovery and documentation review2. Authentication mechanism analysis3. Authorization testing (BOLA, BFLA)4. Input validation testing5. Rate limiting assessmentAgent Configuration Options
| Option | Type | Description |
|---|---|---|
description | string | Agent description for selection |
model | string | Override model for this agent |
mode | string | ”primary” or “subagent” |
color | string | Hex color for UI (#RRGGBB) |
steps | number | Maximum iterations |
temperature | number | Model temperature (0-1) |
Agent Switching
Switch between agents during a session:
Keyboard Shortcuts
| Shortcut | Action |
|---|---|
Tab | Next agent |
Shift+Tab | Previous agent |
<leader>a | Agent list |
Slash Command
/agent web-applicationInline Mention
@web-application scan the login form for vulnerabilitiesInfo
Agents can be customized per-project by placing configuration files in the .cyberstrike/agents/ directory.