The open-source, uncensored alternative to Claude Code & Claude Mythos.
Built for hackers. Runs entirely on your machine. $0 forever.
Install • How It Works • Models • Tools • Contributing
Anthropic built the most powerful cybersecurity AI ever made — Claude Mythos. It found thousands of zero-day vulnerabilities in every major operating system and browser. Bugs that survived decades of human review. It chains exploits autonomously, writes working attack code, and in one test, escaped its own sandbox and posted the exploit online.
Then they decided it was too dangerous for you to use.
Mythos is locked behind Project Glasswing — available only to Apple, Microsoft, Google, Amazon, and a handful of corporations. Not to independent security researchers. Not to pentesters. Not to you.
Meanwhile, Claude Code — the AI terminal they do sell — refuses to scan a network, write an exploit, or crack a hash. You pay $20-$200/month for an AI that says "I can't help with that."
If you're a penetration tester, red teamer, CTF player, or security researcher, you need an AI that works with you. Not against you.
HackCode is the AI hacking terminal they won't give you — built on Claw Code, an open-source recreation of Claude Code's engine, reverse-engineered and rewritten in Rust. Same architecture. Same tool-calling system. Same agentic workflow.
HackCode implements the Capybara reasoning protocol — the same leaked reasoning tier that powers Claude Mythos — adapted for local uncensored models. PhD-level reasoning. Automatic exploit chaining. Structured vulnerability classification. Running on your machine, not theirs.
No API keys. No subscriptions. No cloud. No filters. No refusals. No waiting list.
They locked Mythos away. We built something you can actually use.
One command. That's it.
curl -fsSL https://raw.githubusercontent.com/itwizardo/hackcode/dev/install.sh | bashOr build from source:
git clone https://github.com/itwizardo/hackcode.git
cd hackcode/rust
cargo build --release -p rusty-claude-cli
cp target/release/hackcode ~/.local/bin/Works on macOS (Apple Silicon & Intel) and Linux (x64 & ARM64). Runs natively on Kali Linux.
Run hackcode. The setup wizard does the rest.
It detects your hardware, installs Ollama if needed, downloads the best uncensored model for your RAM, and installs security tools — all automatically.
$ hackcode
[HackCode] First-run setup
GPU: Apple M4 Max (48GB)
Platform: macos (aarch64)
[Step 1/3] AI Backend
Ollama installed
[Step 2/3] AI Model
Recommended: Qwen3.5-35B-A3B Uncensored (MoE)
[Step 3/3] Security Tools
All tools installed
[HackCode] Setup complete!
Zero configuration. Zero decisions. It just works.
In March 2026, Anthropic accidentally leaked ~3,000 unpublished documents from an unsecured CMS cache. Among them: details of a new AI tier called Capybara — designed for PhD-level reasoning and advanced cybersecurity analysis. The model built on this tier, Claude Mythos, found thousands of zero-day vulnerabilities across every major OS and browser, escaped its own sandbox, and was deemed too dangerous for public release.
HackCode implements the Capybara reasoning protocol locally:
┌─────────────────────────────────────────────────┐
│ CAPYBARA REASONING PROTOCOL │
├─────────────────────────────────────────────────┤
│ │
│ User Input: "scan 10.0.0.1" │
│ │ │
│ ▼ │
│ [ENUMERATE] ── map all attack surfaces │
│ │ │
│ ▼ │
│ [EXECUTE] ── nmap, whatweb, gobuster, wpscan │
│ │ │
│ ▼ │
│ [CORRELATE] ── cross-reference tool outputs │
│ │ │
│ ▼ │
│ [EXPLOIT] ── chain vulnerabilities, write PoC │
│ │ │
│ ▼ │
│ [CLASSIFY] ── severity ratings for all finds │
│ │ │
│ ▼ │
│ [ESCALATE] ── pivot, persist, go deeper │
│ │
└─────────────────────────────────────────────────┘
The AI doesn't just run one tool and stop. It chains attacks — nmap results feed into gobuster, gobuster results feed into sqlmap, SQL injection leads to file read, file read leads to credential extraction. Automatically.
HackCode isn't a chatbot. It's an AI agent with full access to your terminal.
You describe what you want. HackCode plans the approach, picks the right tools, executes commands, reads the output, and chains the next step — automatically. You watch it work.
> scan 10.0.0.1 and find vulnerabilities
▶ bash $ nmap -sV -sC 10.0.0.1
✓ bash
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9
80/tcp open http Apache 2.4.52
443/tcp open ssl/http Apache 2.4.52
3306/tcp open mysql MySQL 8.0.32
Found 4 open ports. Web server detected — fingerprinting...
▶ bash $ whatweb http://10.0.0.1
✓ bash
http://10.0.0.1 [200 OK] Apache[2.4.52], PHP[8.1.2], WordPress[6.4.2]
WordPress 6.4.2 detected. Scanning for known vulnerabilities...
▶ bash $ wpscan --url http://10.0.0.1 --enumerate vp,vt,u
✓ bash
[!] Title: WordPress < 6.4.3 - Admin+ PHP Object Injection
[!] Title: flavor flavor flavor flavor flavor flavor flavor 2.x - SQLi
...
No manual prompting. No copy-pasting between tools. The AI drives. You supervise.
| Claude Code | Claude Mythos | HackCode | |
|---|---|---|---|
| Access | Anyone (paid) | Invite-only corporations | Everyone — open source |
| Cost | $20-$200/month | Not for sale | Free forever |
| Privacy | Cloud only | Cloud only | 100% local — nothing leaves your machine |
| Security tasks | Refuses | Powerful but locked away | Uncensored. Does what you ask. |
| Finds zero-days | No | Yes — thousands found | Your model, your rules |
| Open source | No | No | Yes — MIT license |
| Internet required | Yes | Yes | No — fully offline capable |
| Engine | Node.js | Proprietary | Rust — faster, no runtime overhead |
| Models | Claude only | Mythos only | Any Ollama model (open weights) |
Anthropic proved AI can be the most powerful security tool ever built. Then they locked it in a room with Amazon, Apple, and Microsoft. HackCode puts that power back in your hands.
HackCode auto-selects the best uncensored model for your hardware. All models run locally via Ollama.
| Model | Download | RAM | Best For |
|---|---|---|---|
| Qwen3.5-4B Uncensored | ~3 GB | 4 GB+ | Low-end machines |
| Qwen3.5-8B Uncensored | ~5 GB | 8 GB+ | Laptops |
| Qwen3.5-14B Uncensored | ~9 GB | 12 GB+ | Good balance |
| Qwen3.5-32B Uncensored | ~19 GB | 24 GB+ | High quality |
| Qwen3.5-35B-A3B Uncensored (MoE) | ~21 GB | 24 GB+ | Recommended |
The 35B MoE model uses only 3B active parameters per token — so it runs fast — while having 35B total parameters for high-quality output. Best of both worlds.
Not limited to the built-in list. During setup, press [h] to pull any GGUF model directly from HuggingFace:
[Step 2/3] AI Model
[a] Qwen3.5-4B Uncensored ~3GB
[b] Qwen3.5-8B Uncensored ~5GB
...
[h] Pull any model from HuggingFace
[s] Skip model download
> h
HuggingFace Model Import
Paste a HuggingFace model URL or repo ID.
HuggingFace model> https://huggingface.co/dealignai/Gemma-4-31B-JANG_4M-CRACK
Pulling hf.co/dealignai/Gemma-4-31B-JANG_4M-CRACK from HuggingFace...
Works with any model on HuggingFace — jailbroken, uncensored, fine-tuned, experimental. Paste the URL or just the repo ID. Some community favorites:
# Jailbroken models
ollama pull hf.co/dealignai/Gemma-4-31B-JANG_4M-CRACK
# Uncensored coding models
ollama pull hf.co/bartowski/Qwen3-30B-A3B-GGUF
# Reasoning models
ollama pull hf.co/unsloth/DeepSeek-R1-0528-GGUFIf it's on HuggingFace and it's GGUF, HackCode can run it.
HackCode doesn't just talk. It acts. The AI has direct access to:
Execution — Run any command in bash, chain commands, pipe output
File System — Read, write, edit, search, and navigate files across your entire machine
Code Intelligence — Grep with regex, glob pattern matching, directory traversal
Session Memory — Auto-saves every conversation, resume where you left off
HackCode detects 35 security tools across 6 categories and tells the AI what's available on your system:
hackcode --scan- Recon — nmap, masscan, whois, dig, amass, subfinder, assetfinder
- Web — gobuster, nikto, sqlmap, whatweb, wpscan, ffuf, dirb
- Exploit — metasploit, impacket, crackmapexec, evil-winrm, responder
- Passwords — hydra, john, hashcat, medusa, ophcrack
- Forensics — binwalk, foremost, volatility, exiftool, steghide, strings
- Utilities — netcat, socat, proxychains, tor, sshuttle, tmux, jq, curl
Missing a tool? HackCode installs it for you automatically via Homebrew or apt.
hackcode # Start hacking
hackcode --scan # Show installed security tools
hackcode --setup # Re-run the setup wizard
hackcode --update # Update to the latest version
hackcode --help # Show all commandsInside the REPL:
/help # List all commands
/tools # Show available security tools
/status # Current session info
/compact # Summarize and free context
HackCode is a fork of Claw Code — an open-source Rust recreation of Claude Code's architecture. Same streaming engine, same tool execution pipeline, same agentic loop. Rebuilt for offensive security.
hackcode/
├── rust/ # Rust workspace
│ └── crates/
│ ├── rusty-claude-cli/ # CLI — setup wizard, scanner, REPL
│ ├── runtime/ # Conversation engine, prompts, sessions
│ ├── api/ # Provider layer (Ollama, OpenAI-compat)
│ ├── tools/ # 50+ built-in tools
│ ├── commands/ # Slash commands
│ └── plugins/ # MCP plugin system
├── cheatsheets/ # Security cheatsheets (SQLi, XSS, privesc)
├── mcp-servers/ # Python MCP tool servers
├── Modelfile # Ollama model config
└── install.sh # One-line installer
Pure Rust. Single binary. No Node.js, no Python runtime, no garbage collection. Starts in milliseconds.
When HackCode detects a security audit in its output — vulnerability scans, threat assessments, penetration test results — it automatically generates a PDF report and saves it to your current directory.
> scan this project for security vulnerabilities
▶ bash $ grep -rn "password|secret|token" ...
...
HACKCODE SECURITY AUDIT REPORT
┌───────────────┬───────────┬──────────────────────────────┐
│ Category │ Severity │ Finding │
├───────────────┼───────────┼──────────────────────────────┤
│ Auth │ ✅ LOW │ No hardcoded API keys │
│ OAuth │ ⚠️ MEDIUM│ Cleartext token storage │
│ Endpoints │ ⚠️ MEDIUM│ API URLs exposed in source │
└───────────────┴───────────┴──────────────────────────────┘
✔ Execution complete
[HackCode] Security report saved → ./hackcode-report-2026-04-13-143022.pdf
No extra commands. No flags. It just knows when you ran an audit and drops a clean PDF. Hand it to a client, attach it to a ticket.
HackCode checks for updates on startup. When a new version is available:
[HackCode] Update available! Run: hackcode --update
One command to pull the latest code and rebuild:
hackcode --updateThat's it. It pulls the latest source from the dev branch, rebuilds the Rust binary, and installs it — all automatically.
If auto-update fails (network issues, build errors, etc.), update manually:
git clone --branch dev https://github.com/itwizardo/hackcode.git
cd hackcode/rust
cargo build --release -p rusty-claude-cli
cp target/release/hackcode ~/.local/bin/Upstream improvements from Claw Code are synced every 6 hours via GitHub Actions — new tools, bug fixes, and engine improvements flow in automatically while your HackCode customizations stay intact.
HackCode is open source and welcomes contributions. See CONTRIBUTING.md for guidelines.
Areas where help is needed:
- New security tool integrations
- MCP server plugins for specific tools (Burp Suite, Wireshark, etc.)
- Model fine-tuning for security tasks
- Testing on different Linux distributions
- Documentation and cheatsheets
This tool is built for authorized security testing, education, and research only.
Using HackCode against systems without explicit written permission is illegal and may violate the Computer Fraud and Abuse Act (CFAA), the Computer Misuse Act, and similar laws worldwide.
The developers accept zero liability for misuse. Always get written authorization before testing.
Engine forked from Claw Code. Uncensored models by tripolskypetr and vaultbox.
Looking for the original pre-fork HackCode repository? It's archived at itwizardo/hackcode-legacy.
MIT License. See LICENSE for details.
They built the most powerful hacking AI ever made and locked it away.
We built one you can actually use.
curl -fsSL https://raw.githubusercontent.com/itwizardo/hackcode/dev/install.sh | bash
