Strix icon
Strix icon

Strix

Built to help you secure your applications more effectively, Strix is an AI agent, spotting security issues before they become problems.

Strix screenshot 1

Cost / License

  • Free
  • Open Source

Platforms

  • Python
  • Mac
  • Windows
  • Linux
  • BSD
-
No reviews
1like
0comments
0news articles

Features

Suggest and vote on features
  1.  AI-Powered
  2.  OSINT
  3.  HTTP Proxy
  4.  Vulnerability Assessment
  5.  Browser Automation

 Tags

  • source-code-analysis
  • AI Agent
  • agentic-ai-automation
  • hacking-tool
  • patching
  • Cybersecurity
  • hacking
  • osint-tool
  • ai-automation

Strix News & Activities

Highlights All activities

Recent activities

Show all activities

Strix information

  • Developed by

    US flagOmniSecure Inc.
  • Licensing

    Open Source (Apache-2.0) and Free product.
  • Written in

  • Alternatives

    6 alternatives listed
  • Supported Languages

    • English

AlternativeTo Categories

Security & PrivacyNetwork & Admin

GitHub repository

  •  17,866 Stars
  •  1,822 Forks
  •  46 Open Issues
  •   Updated  
View on GitHub
Strix was added to AlternativeTo by Paul on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

What is Strix?

Strix are autonomous AI agents that act just like real hackers - they run your code dynamically, find vulnerabilities, and validate them through actual exploitation. Built for developers and security teams who need fast, accurate security testing without the overhead of manual pentesting or the false positives of static analysis tools.

Features:

Agentic Security Tools

  • Full HTTP Proxy - Full request/response manipulation and analysis
  • Browser Automation - Multi-tab browser for testing of XSS, CSRF, auth flows
  • Terminal Environments - Interactive shells for command execution and testing
  • Python Runtime - Custom exploit development and validation
  • Reconnaissance - Automated OSINT and attack surface mapping
  • Code Analysis - Static and dynamic analysis capabilities
  • Knowledge Management - Structured findings and attack documentation

Comprehensive Vulnerability Detection

  • Access Control - IDOR, privilege escalation, auth bypass
  • Injection Attacks - SQL, NoSQL, command injection
  • Server-Side - SSRF, XXE, deserialization flaws
  • Client-Side - XSS, prototype pollution, DOM vulnerabilities
  • Business Logic - Race conditions, workflow manipulation
  • Authentication - JWT vulnerabilities, session management
  • Infrastructure - Misconfigurations, exposed services

Graph of Agents

  • Distributed Workflows - Specialized agents for different attacks and assets
  • Scalable Testing - Parallel execution for fast comprehensive coverage
  • Dynamic Coordination - Agents collaborate and share discoveries

Official Links