Strix runs inside a Kali Linux-based Docker container with a comprehensive set of security tools pre-installed. The agent can use any of these tools through the terminal.
Reconnaissance
| Tool | Description |
|---|
| Subfinder | Subdomain discovery |
| Naabu | Fast port scanner |
| httpx | HTTP probing and analysis |
| Katana | Web crawling and spidering |
| ffuf | Fast web fuzzer |
| Nmap | Network scanning and service detection |
Web Testing
| Tool | Description |
|---|
| Arjun | HTTP parameter discovery |
| Dirsearch | Directory and file brute-forcing |
| wafw00f | WAF fingerprinting |
| GoSpider | Web spider for link extraction |
Automated Scanners
| Tool | Description |
|---|
| Nuclei | Template-based vulnerability scanner |
| SQLMap | Automatic SQL injection detection and exploitation |
| Wapiti | Web application vulnerability scanner |
| ZAP | OWASP Zed Attack Proxy |
JavaScript Analysis
| Tool | Description |
|---|
| JS-Snooper | JavaScript reconnaissance |
| jsniper | JavaScript file analysis |
| Retire.js | Detect vulnerable JS libraries |
| ESLint | JavaScript static analysis |
| js-beautify | JavaScript deobfuscation |
| JSHint | JavaScript code quality tool |
Source-Aware Analysis
| Tool | Description |
|---|
| Semgrep | Fast SAST and custom rule matching |
| ast-grep | Structural AST/CST-aware code search (sg) |
| Tree-sitter | Syntax tree parsing and symbol extraction (Java/JS/TS/Python/Go/Bash/JSON/YAML grammars pre-configured) |
| Bandit | Python security linter |
Secret Detection
| Tool | Description |
|---|
| TruffleHog | Find secrets in code and history |
| Gitleaks | Detect hardcoded secrets in repositories |
Authentication Testing
| Tool | Description |
|---|
| jwt_tool | JWT token testing and exploitation |
| Interactsh | Out-of-band interaction detection |
Container & Supply Chain
| Tool | Description |
|---|
| Trivy | Filesystem/container scanning for vulns, misconfigurations, secrets, and licenses |
HTTP Proxy
| Tool | Description |
|---|
| Caido | Modern HTTP proxy for interception and replay |
Browser
| Tool | Description |
|---|
| Playwright | Headless browser automation |
All tools are pre-configured and ready to use. The agent selects the appropriate tool based on the vulnerability being tested.