Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
AI-powered pipeline that transforms Cyber Threat Intelligence into actionable pentesting test cases using CrewAI and MITRE ATT&CK IntelStrike A multi-agent AI pipeline that operationalizes Cyber Threat Intelligence (CTI) for penetration testing engagements. Built with CrewAI, Claude, and Tavily. --- How It Works Three agents run sequentially, each passing context to the next: Output A Markdown report containing: - **Executive Summary** - threat context for the engagement - **Threat Actor Profiles** - relevant groups and their targeting patterns Capability contract not published. No trust telemetry is available yet. 7 GitHub stars reported by the source. Last updated 4/15/2026.
Freshness
Last checked 4/15/2026
Best For
intelstrike is best for crewai, multi-agent workflows where OpenClaw compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB REPOS, runtime-metrics, public facts pack
AI-powered pipeline that transforms Cyber Threat Intelligence into actionable pentesting test cases using CrewAI and MITRE ATT&CK IntelStrike A multi-agent AI pipeline that operationalizes Cyber Threat Intelligence (CTI) for penetration testing engagements. Built with CrewAI, Claude, and Tavily. --- How It Works Three agents run sequentially, each passing context to the next: Output A Markdown report containing: - **Executive Summary** - threat context for the engagement - **Threat Actor Profiles** - relevant groups and their targeting patterns
Public facts
5
Change events
1
Artifacts
0
Freshness
Apr 15, 2026
Capability contract not published. No trust telemetry is available yet. 7 GitHub stars reported by the source. Last updated 4/15/2026.
Trust score
Unknown
Compatibility
OpenClaw
Freshness
Apr 15, 2026
Vendor
Yoelapu
Artifacts
0
Benchmarks
0
Last release
Unpublished
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. 7 GitHub stars reported by the source. Last updated 4/15/2026.
Setup snapshot
Setup complexity is LOW. This package is likely designed for quick installation with minimal external side-effects.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Yoelapu
Protocol compatibility
OpenClaw
Adoption signal
7 GitHub stars
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
python
text
[config.py]
│
▼
Agent 1: Threat Profiler
Identifies 2-3 threat groups relevant to the client's
industry, geography, and tech stack
│
▼
Agent 2: TTP Extractor
Extracts and filters TTPs applicable to the known stack,
mapped to MITRE ATT&CK, prioritized by exploitation frequency
│
▼
Agent 3: Test Case Builder
Translates TTPs into an actionable checklist with steps,
tools, payloads, success criteria, and quick wins
│
▼
[intelstrike_report.md]text
intelstrike/ ├── .gitignore # protects secrets and outputs from version control ├── README.md ├── requirements.txt # dependencies ├── config.py # only file you edit per engagement ├── agents.py # agent definitions ├── tasks.py # task definitions └── main.py # entry point
bash
python3 --version # verify your version
bash
python3 -m venv venv source venv/bin/activate # Mac / Linux venv\Scripts\activate # Windows
bash
./venv/bin/pip3 install -r requirements.txt
bash
# Tavily (required for web search) export TAVILY_API_KEY="your-key" # https://tavily.com (free tier: 1,000 calls/month) # Choose ONE LLM provider: export ANTHROPIC_API_KEY="your-key" # https://console.anthropic.com export OPENAI_API_KEY="your-key" # https://platform.openai.com export GOOGLE_API_KEY="your-key" # https://aistudio.google.com export GROQ_API_KEY="your-key" # https://console.groq.com (free tier available) # Ollama: no key needed, just run: ollama pull llama3.2
Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB REPOS
Editorial quality
ready
AI-powered pipeline that transforms Cyber Threat Intelligence into actionable pentesting test cases using CrewAI and MITRE ATT&CK IntelStrike A multi-agent AI pipeline that operationalizes Cyber Threat Intelligence (CTI) for penetration testing engagements. Built with CrewAI, Claude, and Tavily. --- How It Works Three agents run sequentially, each passing context to the next: Output A Markdown report containing: - **Executive Summary** - threat context for the engagement - **Threat Actor Profiles** - relevant groups and their targeting patterns
A multi-agent AI pipeline that operationalizes Cyber Threat Intelligence (CTI) for penetration testing engagements. Built with CrewAI, Claude, and Tavily.
Three agents run sequentially, each passing context to the next:
[config.py]
│
▼
Agent 1: Threat Profiler
Identifies 2-3 threat groups relevant to the client's
industry, geography, and tech stack
│
▼
Agent 2: TTP Extractor
Extracts and filters TTPs applicable to the known stack,
mapped to MITRE ATT&CK, prioritized by exploitation frequency
│
▼
Agent 3: Test Case Builder
Translates TTPs into an actionable checklist with steps,
tools, payloads, success criteria, and quick wins
│
▼
[intelstrike_report.md]
A Markdown report containing:
intelstrike/
├── .gitignore # protects secrets and outputs from version control
├── README.md
├── requirements.txt # dependencies
├── config.py # only file you edit per engagement
├── agents.py # agent definitions
├── tasks.py # task definitions
└── main.py # entry point
config.py Centralized configuration for the pipeline. Contains the engagement profile (industry, geography, tech stack, scope, duration), LLM provider and model selection, output file path, and search settings. This is the only file you need to edit before running a new engagement.
agents.py
Defines the three AI agents used in the pipeline. Each agent has a specific role, goal, and backstory that shapes how it approaches its task. Also contains the _build_llm() function that dynamically constructs the LLM object based on the provider configured in config.py.
| Agent | Role | Responsibility |
|---|---|---|
| threat_profiler | Threat Intelligence Analyst | Researches and identifies relevant threat actor groups for the client profile |
| ttp_extractor | Offensive Security TTP Specialist | Extracts and filters TTPs from identified groups, mapped to MITRE ATT&CK |
| test_case_builder | Penetration Testing Lead | Translates TTPs into an actionable pentest checklist |
tasks.py
Defines the three tasks executed by the pipeline, built dynamically using the engagement context from config.py. Each task specifies what the agent must do, what output is expected, and which previous task results it has access to via CrewAI's context mechanism.
main.py Entry point for the pipeline. Imports configuration, initializes the agents and tasks, assembles the CrewAI crew, and runs the pipeline. Also handles the console output that shows the engagement profile before execution starts.
Python 3.10 or higher is required. CrewAI supports 3.10-3.12.
python3 --version # verify your version
A virtual environment is recommended on all platforms. It isolates project dependencies and avoids conflicts with system packages.
python3 -m venv venv
source venv/bin/activate # Mac / Linux
venv\Scripts\activate # Windows
You should see (venv) at the start of your terminal prompt confirming the environment is active.
./venv/bin/pip3 install -r requirements.txt
Set the API key for your chosen LLM provider and Tavily:
# Tavily (required for web search)
export TAVILY_API_KEY="your-key" # https://tavily.com (free tier: 1,000 calls/month)
# Choose ONE LLM provider:
export ANTHROPIC_API_KEY="your-key" # https://console.anthropic.com
export OPENAI_API_KEY="your-key" # https://platform.openai.com
export GOOGLE_API_KEY="your-key" # https://aistudio.google.com
export GROQ_API_KEY="your-key" # https://console.groq.com (free tier available)
# Ollama: no key needed, just run: ollama pull llama3.2
Edit config.py with the client's details and your preferred LLM:
# LLM provider - pick one
LLM_PROVIDER = "anthropic" # anthropic / openai / google / groq / ollama / azure / bedrock
LLM_MODEL = "claude-sonnet-4-5" # model name for the selected provider
ENGAGEMENT = {
"client_industry": "Financial Services",
"client_geography": "Latin America",
"tech_stack": ["WordPress", "AWS", "MySQL"],
"scope_type": "web application",
"scope_focus": "initial access, authentication bypass, data exfiltration",
"engagement_days": 10,
}
Provider and model examples:
| Provider | LLM_PROVIDER | LLM_MODEL |
|---|---|---|
| Anthropic | "anthropic" | "claude-sonnet-4-5" |
| OpenAI | "openai" | "gpt-4o" |
| Google Gemini | "google" | "gemini/gemini-1.5-pro" |
| Groq | "groq" | "groq/llama-3.1-70b-versatile" |
| Ollama (local) | "ollama" | "ollama/llama3.2" |
python main.py
Validate config and API keys without running:
python main.py --dry-run
The report is saved to intelstrike_report.md by default. The output path can be changed in config.py.
All settings live in config.py:
| Setting | Description | Default |
|---|---|---|
| ENGAGEMENT["client_industry"] | Client's industry vertical | "Financial Services" |
| ENGAGEMENT["client_geography"] | Client's operating geography | "Latin America" |
| ENGAGEMENT["tech_stack"] | Known technologies in scope | ["WordPress", "AWS", "MySQL"] |
| ENGAGEMENT["scope_type"] | Type of engagement | "web application" |
| ENGAGEMENT["scope_focus"] | Key objectives to prioritize within the scope | "initial access, authentication bypass, data exfiltration" |
| ENGAGEMENT["engagement_days"] | Engagement duration in days | 10 |
| OUTPUT_FILE | Output report filename | "intelstrike_report.md" |
| LLM_PROVIDER | LLM provider to use | "anthropic" |
| LLM_MODEL | Model name for the selected provider | "claude-sonnet-4-5" |
| LLM_MAX_ITER | Max agent iterations | 3 |
| VERBOSE | Console output verbosity | True |
| SEARCH_MAX_RESULTS | Tavily results per query | 3 |
The pipeline is not limited to web application testing. It works for any engagement type - the agents adapt their research and TTP selection based on scope_type, scope_focus, and tech_stack.
Web Application
ENGAGEMENT = {
"client_industry": "Financial Services",
"client_geography": "Latin America",
"tech_stack": ["WordPress", "AWS", "MySQL"],
"scope_type": "web application",
"scope_focus": "initial access, authentication bypass, data exfiltration",
"engagement_days": 10,
}
Active Directory / Internal Network
ENGAGEMENT = {
"client_industry": "Government",
"client_geography": "United States",
"tech_stack": ["Active Directory", "Windows Server 2022", "Exchange"],
"scope_type": "internal network",
"scope_focus": "lateral movement, privilege escalation, domain compromise",
"engagement_days": 14,
}
Infrastructure / Network
ENGAGEMENT = {
"client_industry": "Energy",
"client_geography": "Europe",
"tech_stack": ["Cisco IOS", "Windows Server", "VMware"],
"scope_type": "infrastructure",
"scope_focus": "network access, credential harvesting, persistence",
"engagement_days": 10,
}
Cloud
ENGAGEMENT = {
"client_industry": "Technology",
"client_geography": "Asia Pacific",
"tech_stack": ["AWS", "S3", "EC2", "IAM", "Lambda"],
"scope_type": "cloud",
"scope_focus": "misconfiguration, IAM privilege escalation, data exfiltration",
"engagement_days": 7,
}
MIT - use freely, attribution appreciated.
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/snapshot"
curl -s "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract"
curl -s "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
70
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents
Traction
No public download signal
Freshness
Updated 2d ago
Rank
70
AI productivity studio with smart chat, autonomous agents, and 300+ assistants. Unified access to frontier LLMs
Traction
No public download signal
Freshness
Updated 5d ago
Rank
70
Free, local, open-source 24/7 Cowork app and OpenClaw for Gemini CLI, Claude Code, Codex, OpenCode, Qwen Code, Goose CLI, Auggie, and more | 🌟 Star if you like it!
Traction
No public download signal
Freshness
Updated 6d ago
Rank
70
The Frontend for Agents & Generative UI. React + Angular
Traction
No public download signal
Freshness
Updated 23d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"OPENCLEW"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_REPOS",
"generatedAt": "2026-04-16T23:38:01.110Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "OPENCLEW",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "crewai",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "multi-agent",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:OPENCLEW|unknown|profile capability:crewai|supported|profile capability:multi-agent|supported|profile"
}Facts JSON
[
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Yoelapu",
"href": "https://github.com/yoelapu/intelstrike",
"sourceUrl": "https://github.com/yoelapu/intelstrike",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T06:04:19.618Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "OpenClaw",
"href": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-04-15T06:04:19.618Z",
"isPublic": true
},
{
"factKey": "traction",
"category": "adoption",
"label": "Adoption signal",
"value": "7 GitHub stars",
"href": "https://github.com/yoelapu/intelstrike",
"sourceUrl": "https://github.com/yoelapu/intelstrike",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-04-15T06:04:19.618Z",
"isPublic": true
},
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/crewai-yoelapu-intelstrike/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to intelstrike and adjacent AI workflows.