Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI Pentest Tool Enhances Security Testing with New Features

AI Pentest Tool Enhances Security Testing with New Features

Posted on February 15, 2026 By CWS

PentestAgent, an innovative open-source AI framework developed by Masic, also known as GH05TCREW, has introduced significant enhancements to its capabilities. The latest updates include prebuilt attack playbooks and seamless integration with HexStrike, a move that promises to advance the field of cybersecurity.

Innovative AI Framework for Security

Released under the alias GH05TCREW, PentestAgent leverages advanced language models like Claude Sonnet and GPT-5 through LiteLLM to perform comprehensive black-box security assessments. This tool, accessible via GitHub, caters to pentesters seeking AI support while maintaining operational control through a terminal user interface (TUI).

The tool operates in several modes, including assisted chats, autonomous agents, and multi-agent orchestrations, providing flexibility for various testing environments. Users are urged to ensure compliance with legal standards by only testing systems with explicit authorization to avoid legal repercussions.

Comprehensive Core Features

PentestAgent is equipped with structured attack playbooks, enabling users to execute web app testing with THP3-style assessments. These playbooks guide the AI through the stages of reconnaissance, vulnerability scanning, and exploitation, utilizing domain-specific insights from a Retrieval-Augmented Generation (RAG) system.

During testing sessions, important data such as credentials and vulnerabilities are documented in loot/notes.json, which supports strategic insights in Crew mode through a ‘shadow graph’. This mode enables an orchestrator to deploy specialized agents for more in-depth analysis.

Advanced Tools and Setup

The tool supports various operational modes, including interactive chat and multi-agent orchestration, with built-in tools like a terminal for commands and a browser for web interactions. Setup is straightforward for Python 3.10+ environments, requiring repository cloning and script execution for configuration.

Docker enhances usability through pre-built images, facilitating the deployment of comprehensive security tools. The integration of HexStrike, found in third_party/hexstrike, adds advanced pentesting capabilities, making the PentestAgent a robust tool for security professionals.

With these updates, PentestAgent positions itself as a leader in AI-driven security testing, offering a powerful solution for cybersecurity challenges. Follow ongoing developments and updates through our channels on Google News, LinkedIn, and X.

Cyber Security News Tags:AI agent framework, AI security, cyber tools, Cybersecurity, HexStrike integration, large language models, open-source AI, pentest tool, security testing, vulnerability assessment

Post navigation

Previous Post: ClickFix Attack Uses DNS Hijacking to Deploy Malware
Next Post: Windows 11 Update KB5077181 Triggers Endless Reboot Issues

Related Posts

New Blitz Malware Attacking Windows Servers to Deploy Monero Miner New Blitz Malware Attacking Windows Servers to Deploy Monero Miner Cyber Security News
Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Cyber Security News
Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure Hackers Started Exploiting CitrixBleed 2 Vulnerability Before Public PoC Disclosure Cyber Security News
Encrypting Data to Meet Global Privacy Law Requirements Encrypting Data to Meet Global Privacy Law Requirements Cyber Security News
Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier Cyber Security News
Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature Hackers Exploiting Triofox 0-Day Vulnerability to Execute Malicious Payload Abusing Anti-Virus Feature Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Qilin Ransomware Disables EDR Systems with Malicious DLL
  • Ransomware Campaign Mimics Akira in South America
  • Claude Code Faces Security Flaw After Source Leak
  • Fake CERT-UA Website Distributes Go-Based Malware
  • Apple Enhances Device Security Against DarkSword Exploit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Qilin Ransomware Disables EDR Systems with Malicious DLL
  • Ransomware Campaign Mimics Akira in South America
  • Claude Code Faces Security Flaw After Source Leak
  • Fake CERT-UA Website Distributes Go-Based Malware
  • Apple Enhances Device Security Against DarkSword Exploit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark