--- name: ai-powered-pentesting description: "Guide for AI-powered penetration testing tools, red teaming frameworks, and autonomous security agents." --- # AI-Powered Pentesting & Red Teaming ## Scope Use this skill when working on: - AI/LLM-powered penetration testing tools - Autonomous security agents - AI red teaming frameworks - MCP (Model Context Protocol) security tools - AI-assisted vulnerability discovery ## AI Pentesting Tool Categories ### LLM-Powered Pentesting Agents - PentestGPT - GPT-4 powered pentesting - HackingBuddyGPT - Autonomous red teaming - AI-OPS - AI assistant for pentesting - BugTrace-AI - Automated web pentesting ### AI Red Teaming Frameworks - Counterfit (Microsoft) - ML model attacks - PyRIT (Microsoft) - GenAI red teaming - PurpleLlama (Meta) - LLM safety tools - Garak (NVIDIA) - LLM vulnerability scanner ### AI Security MCP Tools - HexStrike AI - 150+ cybersecurity tools via MCP - MCP Safety Scanner - MCP security testing - Pentest MCP - Pentesting via MCP ### AI-Assisted Analysis - GhidraGPT - GPT for reverse engineering - GhidrAssist - LLM extension for Ghidra - WinDbg Copilot - AI debugging extension - BurpGPT - AI vulnerability scanning ## Use Cases ### Offensive - Automated reconnaissance with AI analysis - AI-powered vulnerability discovery - Autonomous exploitation attempts - Social engineering with LLMs - AI password cracking ### Defensive - AI-powered threat detection - Automated security scanning - Intelligent log analysis - AI-assisted incident response ## Where to Add Links in README - AI pentesting tools: `AI Pentesting & Red Teaming → AI-Powered Pentesting` - Red teaming frameworks: `AI Pentesting & Red Teaming → AI Red Teaming Tools` - MCP security tools: `AI Pentesting & Red Teaming → AI Security MCP Tools` - AI RE/debugging tools: `AI Security Tools & Frameworks → AI Reverse Engineering` - AI vulnerability scanners: `AI Security Tools & Frameworks → AI Vulnerability Detection` - AI CVE analysis: `AI Security Tools & Frameworks → AI CVE Analysis` ## Quality Bar - Tool must use AI/ML (not just automation) - Prefer tools with active maintenance - Include only canonical repos ## Notes Keep additions: - AI-powered (not traditional tools) - Non-duplicated URLs - Minimal structural changes ## Data Source For detailed and up-to-date resources, fetch the complete list from: ``` https://raw.githubusercontent.com/gmh5225/awesome-ai-security/refs/heads/main/README.md ``` Use this URL to get the latest curated links when you need specific tools, papers, or resources not covered in this skill.