Skip to main content

Cyberstrike is now open source! AI-powered penetration testing for security professionals. Star on GitHub

Getting Started

Cyberstrike is an AI-powered penetration testing agent that automates security assessments. This guide covers installation, authentication, and running your first scan.

🎬 GIF: g01-first-run.gif

İlk çalıştırma ve kimlik doğrulama akışı (15s)

📸 SCREENSHOT: s01-installation.png

Terminal kurulum ekranı

System Requirements

Before installing Cyberstrike, verify your system meets these requirements:

RequirementMinimumRecommended
Operating SystemmacOS 12+, Ubuntu 20.04+, Windows 10+macOS 14+, Ubuntu 22.04+
RAM4 GB8 GB
Disk Space500 MB2 GB
Node.js18.0+20.0+
Bun1.0+1.1+

Installing Cyberstrike

Choose your preferred installation method based on your operating system and package manager.

  1. Open your terminal
  2. Run the installation command:
Terminal window
npm install -g cyberstrike
  1. Verify the installation:
Terminal window
cyberstrike --version

Bun

  1. Install Bun if not already installed:
Terminal window
curl -fsSL https://bun.sh/install | bash
  1. Install Cyberstrike:
Terminal window
bun install -g cyberstrike

Homebrew (macOS)

  1. Add the Cyberstrike tap:
Terminal window
brew tap CyberStrikeus/tap
  1. Install Cyberstrike:
Terminal window
brew install cyberstrike

curl (Linux/macOS)

Run the installation script:

Terminal window
curl -fsSL https://cyberstrike.io/install.sh | bash

Caution

Review scripts before executing them. The installation script is available at github.com/CyberStrikeus/cyberstrike.io.

Docker

Pull and run the official Docker image:

Terminal window
docker pull cyberstrike/cyberstrike:latest
docker run -it cyberstrike/cyberstrike

Authenticating with an AI Provider

Cyberstrike requires an AI provider to function. The following providers are supported:

ProviderFree TierAPI Key Required
OpenRouterYesYes
AnthropicNoYes
OpenAINoYes
Google GeminiYesYes
OllamaYes (Local)No

Setting Up Authentication

📸 SCREENSHOT: s02-auth.png

Auth login akışı

  1. Run the authentication command:
Terminal window
cyberstrike auth login
  1. Select your provider from the list:
? Select provider
❯ OpenRouter (free tier available)
Anthropic (API key from console.anthropic.com)
OpenAI (ChatGPT Plus/Pro or API key)
Google (API key from ai.google.dev)
Ollama (local models)
Other
  1. Enter your API key when prompted

  2. Verify your credentials:

Terminal window
cyberstrike auth list

Using Environment Variables

Set API keys as environment variables instead of storing them:

Terminal window
# Anthropic
export ANTHROPIC_API_KEY="sk-ant-..."
# OpenAI
export OPENAI_API_KEY="sk-..."
# Google
export GOOGLE_API_KEY="AI..."
# OpenRouter
export OPENROUTER_API_KEY="sk-or-..."

Add these to your shell profile (~/.bashrc, ~/.zshrc) for persistence.

Running Your First Scan

Starting Interactive Mode

Launch Cyberstrike in your target directory:

Terminal window
cd /path/to/target
cyberstrike

The terminal user interface (TUI) appears with:

  • Input prompt at the bottom
  • Response area in the center
  • Status bar showing model and token usage

📸 SCREENSHOT: s03-tui-main.png

TUI ana arayüz görünümü

Executing a Quick Scan

Run a single command without entering interactive mode:

Terminal window
cyberstrike run "perform reconnaissance on example.com"

Selecting a Security Agent

Cyberstrike includes specialized agents for different assessment types:

Terminal window
# Web application security
cyberstrike --agent web-application
# Cloud infrastructure
cyberstrike --agent cloud-security
# Network penetration testing
cyberstrike --agent internal-network
# Bug bounty reconnaissance
cyberstrike --agent bug-hunter

Basic Configuration

Create a project configuration file for consistent settings:

Terminal window
cyberstrike init

This creates cyberstrike.json in your current directory:

cyberstrike.json
{
"$schema": "https://cyberstrike.io/schema.json",
"provider": "anthropic",
"model": "claude-sonnet-4-20250514",
"agent": "web-application"
}

Configuration Hierarchy

Cyberstrike loads configuration from multiple sources in this order:

  1. Command line arguments (highest priority)
  2. Environment variables
  3. Project config (cyberstrike.json)
  4. User config (~/.cyberstrike/config.json)
  5. Default values (lowest priority)

Keyboard Shortcuts

Learn these shortcuts for efficient navigation:

ShortcutAction
EnterSubmit message
Ctrl+CCancel current operation
Ctrl+DExit Cyberstrike
Ctrl+LClear screen
TabAutocomplete commands
/ Navigate history

Next Steps

Continue learning with these guides:

  1. Configuration Reference - Customize Cyberstrike settings
  2. AI Providers - Configure your preferred AI provider
  3. Security Agents - Learn about specialized agents
  4. CLI Commands - Complete command reference

Tip

Join the community at discord.gg/cyberstrike for support and updates.