Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI Pentest Tool Enhances Security Testing with New Features

AI Pentest Tool Enhances Security Testing with New Features

Posted on February 15, 2026 By CWS

PentestAgent, an innovative open-source AI framework developed by Masic, also known as GH05TCREW, has introduced significant enhancements to its capabilities. The latest updates include prebuilt attack playbooks and seamless integration with HexStrike, a move that promises to advance the field of cybersecurity.

Innovative AI Framework for Security

Released under the alias GH05TCREW, PentestAgent leverages advanced language models like Claude Sonnet and GPT-5 through LiteLLM to perform comprehensive black-box security assessments. This tool, accessible via GitHub, caters to pentesters seeking AI support while maintaining operational control through a terminal user interface (TUI).

The tool operates in several modes, including assisted chats, autonomous agents, and multi-agent orchestrations, providing flexibility for various testing environments. Users are urged to ensure compliance with legal standards by only testing systems with explicit authorization to avoid legal repercussions.

Comprehensive Core Features

PentestAgent is equipped with structured attack playbooks, enabling users to execute web app testing with THP3-style assessments. These playbooks guide the AI through the stages of reconnaissance, vulnerability scanning, and exploitation, utilizing domain-specific insights from a Retrieval-Augmented Generation (RAG) system.

During testing sessions, important data such as credentials and vulnerabilities are documented in loot/notes.json, which supports strategic insights in Crew mode through a ‘shadow graph’. This mode enables an orchestrator to deploy specialized agents for more in-depth analysis.

Advanced Tools and Setup

The tool supports various operational modes, including interactive chat and multi-agent orchestration, with built-in tools like a terminal for commands and a browser for web interactions. Setup is straightforward for Python 3.10+ environments, requiring repository cloning and script execution for configuration.

Docker enhances usability through pre-built images, facilitating the deployment of comprehensive security tools. The integration of HexStrike, found in third_party/hexstrike, adds advanced pentesting capabilities, making the PentestAgent a robust tool for security professionals.

With these updates, PentestAgent positions itself as a leader in AI-driven security testing, offering a powerful solution for cybersecurity challenges. Follow ongoing developments and updates through our channels on Google News, LinkedIn, and X.

Cyber Security News Tags:AI agent framework, AI security, cyber tools, Cybersecurity, HexStrike integration, large language models, open-source AI, pentest tool, security testing, vulnerability assessment

Post navigation

Previous Post: ClickFix Attack Uses DNS Hijacking to Deploy Malware

Related Posts

Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents Cyber Security News
11 Best Cloud Access Security Broker Software (CASB) 11 Best Cloud Access Security Broker Software (CASB) Cyber Security News
Checkpoint Details on How Attackers Drained 8M from Balancer Pools Within 30 Minutes Checkpoint Details on How Attackers Drained $128M from Balancer Pools Within 30 Minutes Cyber Security News
What Are The Takeaways from The Scattered Lapsus $Hunters Statement? What Are The Takeaways from The Scattered Lapsus $Hunters Statement? Cyber Security News
NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control Cyber Security News
New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Pentest Tool Enhances Security Testing with New Features
  • ClickFix Attack Uses DNS Hijacking to Deploy Malware
  • Data Breach by Over 300 Chrome Extensions Uncovered
  • macOS Users Targeted by Malware via Google Ads
  • Critical OpenSea Exploit Chain for Sale on Dark Web

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Pentest Tool Enhances Security Testing with New Features
  • ClickFix Attack Uses DNS Hijacking to Deploy Malware
  • Data Breach by Over 300 Chrome Extensions Uncovered
  • macOS Users Targeted by Malware via Google Ads
  • Critical OpenSea Exploit Chain for Sale on Dark Web

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News