Get Started
Quickstart
Run your first security scan in under 5 minutes
Installation
Install Strix and configure your environment
How It Works
Understand Strix’s multi-agent architecture
CLI Reference
Complete command-line reference
Key Features
Autonomous Agents
AI agents collaborate to find and exploit vulnerabilities
Security Toolkit
Browser automation, proxy, terminal, and Python execution
Specialized Skills
Pre-built knowledge for frameworks and vulnerability types
CI/CD Integration
Integrate security testing into your pipeline
What Makes Strix Different?
Real Vulnerability Validation
Real Vulnerability Validation
Strix doesn’t just flag potential issues—it validates them with working proof-of-concept exploits. Every reported vulnerability includes detailed reproduction steps and evidence.
Multi-Agent Collaboration
Multi-Agent Collaboration
Multiple specialized AI agents work together, sharing information and coordinating attacks just like a real penetration testing team.
White-Box and Black-Box Testing
White-Box and Black-Box Testing
Test deployed applications, analyze source code, or combine both for comprehensive security coverage.
Customizable Testing
Customizable Testing
Use custom instructions to focus on specific vulnerabilities, provide credentials, or guide the testing approach.