CyberStrikeAI and BugTraceAI-CLI

CyberStrikeAI
71
Verified
BugTraceAI-CLI
44
Emerging
Maintenance 25/25
Adoption 10/25
Maturity 13/25
Community 23/25
Maintenance 13/25
Adoption 8/25
Maturity 9/25
Community 14/25
Stars: 2,785
Forks: 453
Downloads:
Commits (30d): 182
Language: Go
License: Apache-2.0
Stars: 59
Forks: 8
Downloads:
Commits (30d): 0
Language: Python
License: AGPL-3.0
No Package No Dependents
No Package No Dependents

About CyberStrikeAI

Ed1s0nZ/CyberStrikeAI

CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engine, role-based testing with predefined security roles, a skills system with specialized testing skills, and comprehensive lifecycle management capabilities.

Based on the README, here's a technical summary that goes deeper: --- Uses native MCP (Model Context Protocol) with HTTP/stdio/SSE transports and external federation to connect AI agents directly to security tools, enabling conversational control flow through an orchestration engine that supports multi-agent delegation patterns (Eino DeepAgent). Includes vector-search knowledge base, attack-chain graph replay with risk scoring, WebShell management for post-exploitation, and optional Burp Suite integration via plugin architecture; persists all audit trails and task queues in SQLite with password-protected web UI. --- **Word count: ~65 | Key technical details**: MCP protocol variants, multi-agent orchestration, vector search, attack graphs, WebShell C2 capabilities, plugin extensibility, SQLite backend

About BugTraceAI-CLI

BugTraceAI/BugTraceAI-CLI

Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine

Integrates SQLMap for active SQL injection testing, Playwright for browser-based XSS validation, and Nuclei templates for CVE scanning, while supporting MCP (Model Context Protocol) for extended tooling like Kali Linux. Uses a 6-phase pipeline with multi-persona LLM analysis (consensus voting to reduce false positives), then routes confirmed findings to 14+ specialist exploitation agents that execute real payloads and capture proof-of-concept evidence. Automatically detects WAF protection and applies adaptive bypass techniques across encoding, chunking, and case-mixing strategies.

Scores updated daily from GitHub, PyPI, and npm data. How scores work