Quick Start
Install and run your first scan in minutes.
CLI Reference
Learn all command-line options.
Tools
Explore the security testing toolkit.
GitHub Actions
Integrate into your CI/CD pipeline.
Key Capabilities
- Full hacker toolkit — Browser automation, HTTP proxy, terminal, Python runtime
- Real validation — PoCs, not false positives
- Multi-agent orchestration — Specialized agents collaborate on complex targets
- Developer-first CLI — Interactive TUI or headless mode for automation
Vulnerability Coverage
Strix can identify and validate:| Category | Examples |
|---|---|
| Access Control | IDOR, privilege escalation, auth bypass |
| Injection | SQL, NoSQL, command injection |
| Server-Side | SSRF, XXE, deserialization |
| Client-Side | XSS, prototype pollution, DOM vulnerabilities |
| Business Logic | Race conditions, workflow manipulation |
| Authentication | JWT vulnerabilities, session management |