Cyber Security

BreachSeek, AI-Based Automated Multi-Platform Penetration Testing Tool

AI is significantly evolving penetration testing by enhancing automation, accuracy, and adaptability. 

AI-driven tools can simulate sophisticated attack techniques, analyze vast datasets for vulnerabilities, and determine genuine threats from false positives, allowing security teams to focus on critical risks.

The following cybersecurity analysts from King Fahd University of Petroleum and Minerals (KFUPM) recently developed BreachSeek, it’s the first AI platform that provides safety and allows websites and network penetration testing to serve as breach assessment tools:-

  • Ibrahim AlShehri
  • Adnan AlShehri
  • Abdulrahman AlMalki
  • Majed Bamardouf
  • Alaqsa Akbar

The authors implemented a multi-agent system with the help of LLMs using LangChain and LangGraph with Python.

Such self-sufficient agents are able to search for vulnerabilities, simulate cyberattacks, and exploit them with as little help from humans as possible.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

BreachSeek Penetration Testing Tool

Within the platform’s architecture, it contains various individual specialized AI agents that are hosted in separate containers which resolves the context window limitations of LLMs and guarantees extension in case of different network sizes.

Merging artificial intelligence, natural language processing, and security intelligence, BreachSeek provides an all-inclusive approach that is more effective than manual pen testing in terms of time taken, accuracy, and response to new threats.

As a result, this technique is particularly beneficial for companies dealing with information of a confidential nature such as finance, medicine, and government in which time-consuming vulnerability scanning is unacceptable.

Large language models (LLMs) are rapidly transforming the cybersecurity landscape, and this is happening more specifically in penetration testing automation. 

Tools like PentestGPT make use of the LLMs to perform tasks traditionally done by human testers. 

While the PentestGPT outperformed GPT-3.5 and GPT-4 on a benchmark of 182 sub-tasks aligned with OWASP’s top 10 vulnerabilities. 

Besides this, other tools like Mayhem use fuzzing and symbolic execution to quickly identify vulnerabilities.

The general workflow of such models (Source – Arxiv)

BreachSeek uses several AI agents to deal with the context windows before proceeding to interface with the target environment. 

These developments are quite useful in increasing the efficiency of vulnerability detection and test scenarios.

Breachseek UI

But here the main barriers still lie within the area of context over extended interactions and adapting to specific organizational needs.

However, future developments focus on improving the continuous learning aspect of the LMLs for preparedness in case of sudden changes in the situation. 

The introduction of these LLMs within the cybersecurity landscape represents a significant step forward. 

However, this requires continued research that is proactive and responsive to the challenges faced in order to exploit these technologies for defensive cyber warfare, which is not basic.

Download Free Incident Response Plan Template for Your Security Team – Free Download

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

Kali Linux 2025.3 Released With New Features and 10 New Hacking Tools

Kali team has released Kali Linux 2025.3, the third major update of the year for…

15 minutes ago

CISA Details That Hackers Gained Access to a U.S. Federal Agency Network Via GeoServer RCE Vulnerability

CISA has released a comprehensive cybersecurity advisory detailing how threat actors successfully compromised a U.S.…

1 hour ago

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Google has issued an urgent security update for its Chrome web browser to address three…

5 hours ago

Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access

Cybersecurity professionals are facing an unprecedented acceleration in threat actor capabilities as the average breakout…

7 hours ago

New Malware in npm Package Steals Browser Passwords Using Steganographic QR Code

A sophisticated malware campaign has emerged in the npm ecosystem, utilizing an innovative steganographic technique…

8 hours ago

Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware

Zloader, a sophisticated Zeus-based modular trojan that first emerged in 2015, has undergone a significant…

8 hours ago