{"id":1195,"date":"2025-05-12T10:39:32","date_gmt":"2025-05-12T08:39:32","guid":{"rendered":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/"},"modified":"2026-03-25T15:20:23","modified_gmt":"2026-03-25T14:20:23","slug":"no-more-secrets-the-use-of-offensive-ai","status":"publish","type":"post","link":"https:\/\/blog.kybervandals.com\/no-more-secrets-the-use-of-offensive-ai\/","title":{"rendered":"No More Secrets: The Use of Offensive AI"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.unsplash.com\/photo-1527430253228-e93688616381?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDF8fGV4b3NrZWxldG9uJTIwcm9ib3R8ZW58MHx8fHwxNzQ2NzgwNjM1fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=2000\" alt=\"No More Secrets: The Use of Offensive AI\" \/><\/p>\n\n<div class=\"kg-card kg-cta-card kg-cta-bg-blue kg-cta-immersive\" data-layout=\"immersive\">\n<div class=\"kg-cta-content\">\n<div class=\"kg-cta-content-inner\">\n<div class=\"kg-cta-text\">\n<p><b><strong>TL;DR: AI makes the good ones faster, attacks cheaper and the impact more precise. Also, AI is currently implemented into attack-tools, which means no attackvectors will remain hidden, leading to an sharp increase of successrates.<\/strong><\/b><\/p>\n<p><b><strong>Buckle up, BlueTeam<\/strong><\/b><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<h1>Intro + Scope<\/h1>\n\n<p>This article will focus on the part where AI is used in attacks or used to support attackers in the real world already. And while there is no fancy attacking AI (yet &#8230; wink wink, Chrome &amp; Wintermute), AI shapes and will reshape the battleground for cyberattacks completely new. <\/p>\n\n<h1>Code Red Team<\/h1>\n\n<p>So &#8230; what is &#8222;out there&#8220;? <\/p>\n<p>First of all, offensive AI is advancing faster than defensive AI. It has fewer constraints, less integration issues, less compliance-overhead. Any smart guy who understands the potential of AgenticAI connected to all datasource that are out there, can build something like the perfect looking-glass into any kind of attack surface. <\/p>\n<p>That is exactly, what we at zeroBS currently are doing. We already train an AgenticAI (Projec Xone) to assist us in crafting attack-vectors against any targets by using traditional recon-data that gets fetched by Xone who then executes analysis and shows us potential attackvectors, based on what is already trained so far. And if there is a new system the model doesnt know yet, it prompts for inpout, so we can feed that information back as part of supervised learning. Thanks to MCP, there is hardly any limit on which datasource we can feed into the system.<\/p>\n<p>Here is how it works: <\/p>\n<h4>RAW  Phase<\/h4>\n<ul>\n<li>input: target, that can be a domain, network, AS<\/li>\n<li>use all sources we provide (shodan, servicediscovery, networkanalysis, bgp\/peering-info, webtracer, apifinder, ip\/geotracing etc)<\/li>\n<li>find all valid and possible attack-vectors, <\/li>\n<li>give each attack-vector a DRS &#8211; score, based on detected mitigation, meaning: how hard is it probably, to attack via that route for impact<\/li>\n<li>analyse possible impacts and sideffects<\/li>\n<li>put everything in a nice sortable matrix so we can see what targets we can  attack on network or application level<\/li>\n<\/ul>\n<h5>BBQ Phase <\/h5>\n<ul>\n<li>input: scope \/ objectives \/ what we want to achieve<\/li>\n<li>re-consider attacks-vectors based on the objective<\/li>\n<\/ul>\n<p>example: there is a target we need to attack who operates their own AS\/Network and datacenter. Xone then gets this information and does a classic recon, tries to find volumetric protection, firewalls, WAFs, etc; all systems are visible. And through some traceroute-magic it even sometimes finds the central firewall, which is always a very good target.<\/p>\n<p>in the 2nd phase we tell the system what our objectives are, e.g. take down an app or the whole system, of find a stealthy attack vector. lets say we want to take down a whole cluster of apps, and Xone identifies Akamai as volumetric protection, it might then suggest, not to leverage a full volumetric attack, but to attack an identified central Firewall with 100mbit spoofed IPs, because the AIgent knows that the Firewall has problems with that attack. Bonus: those attack doesnt generate much traces: you need to know what to look for and also have an excellent monitoring setup to identify the attack. <\/p>\n<p>Or maybe Xone finds that certain API-endpoints are not cached, thus can be attacked because no caching means always compute, which is what an attacker aims for. <\/p>\n<p>The difference:  What took a skilled senior 2\/3 days of analysis, can now be achieved by a junior with a prompt-input, with the results beeing delivered after 1-2 hrs. And the result is always high-quality, doesnt rely on the daily form or workload of the consultant.<\/p>\n<p>With such systems, no attack vector remains hidden<\/p>\n\n<div class=\"kg-card kg-callout-card kg-callout-card-blue\">\n<div class=\"kg-callout-emoji\">\ud83d\udca1<\/div>\n<div class=\"kg-callout-text\"><b><strong>Thats the shift. The danger is falling behind while attackers learn how to use it well and are able to craft attacks faster, with an higher impcat.<\/strong><\/b><\/div>\n<\/div>\n<h4>But is it just an halluzination from our side?<\/h4>\n\n<p>Well, unfortunately not. Usage of AI-tools to support attacks in different stages are already visible. <\/p>\n<p>Google <a href=\"https:\/\/arxiv.org\/pdf\/2503.11917?ref=blog.kybervandals.com\" rel=\"noreferrer\">run some test <\/a>and found exact numbers to what was a gut-feeling from our side: AI can speed up attacks and reduce costs in all stages of an attack.<\/p>\n\n<figure class=\"kg-card kg-image-card kg-width-wide kg-card-hascaption\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.kybervandals.com\/content\/images\/2025\/05\/gfw-p1.png\" class=\"kg-image\" alt=\"No More Secrets: The Use of Offensive AI\" width=\"2000\" height=\"916\" \/><figcaption><span>Mapping potential AI-enabled cost reductions to specific attack phases provides decisionrelevant insights for defenders. src: <\/span><a href=\"https:\/\/arxiv.org\/pdf\/2503.11917?ref=blog.kybervandals.com\"><span>https:\/\/arxiv.org\/pdf\/2503.11917<\/span><\/a><\/figcaption><\/figure>\n\n<p>Google confirms what we internally see as well, how AgenticAI can reduce costs on the attacker-side; you better think of &#8222;reduce costs&#8220; as &#8222;faster and with better impact&#8220;. <\/p>\n\n<h3>Butter bei die Fische: Real World Examples<\/h3>\n\n<p>Beside all that ChitChat about potential, there is already Adversarial AI in use to be seen ITW. Furthermore, attack-tools are getting equipped with AI-capabilities<\/p>\n\n<h3>Akira Botnet<\/h3>\n<p><a href=\"https:\/\/www.sentinelone.com\/labs\/akirabot-ai-powered-bot-bypasses-captchas-spams-websites-at-scale\/?ref=blog.kybervandals.com\">SentinelOne had observed<\/a> a botnet (AkiraBot) that used AI to bypass Captcha and spammed over 400.000 sites\/forums. <\/p>\n<blockquote><p>AkiraBot puts significant emphasis on evading CAPTCHAs so that it can spam websites at scale. The targeted CAPTCHA services include hCAPTCHA and reCAPTCHA, including Cloudflare\u2019s hCAPTCHA service in certain versions of the tool.<\/p><\/blockquote>\n<h3>Browser-integrations<\/h3>\n\n<figure class=\"kg-card kg-image-card kg-card-hascaption\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.kybervandals.com\/content\/images\/2025\/05\/browser.png\" class=\"kg-image\" alt=\"No More Secrets: The Use of Offensive AI\" width=\"1562\" height=\"734\" \/><figcaption><span>src: <\/span><a href=\"https:\/\/x.com\/byt3bl33d3r\/status\/1881146899727786322?ref=blog.kybervandals.com\"><span>https:\/\/x.com\/byt3bl33d3r\/status\/1881146899727786322<\/span><\/a><\/figcaption><\/figure>\n\n<h3>AI-usage by Actors<\/h3>\n<p><a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/adversarial-misuse-generative-ai?ref=blog.kybervandals.com\">Google observed different Actors<\/a> (ab)using Gemini in support of different stages of their operation<\/p>\n<ul>\n<li><strong>Threat actors are experimenting with Gemini to enable their operations, finding productivity gains but not yet developing novel capabilities<\/strong>. At present, they primarily use AI for research, troubleshooting code, and creating and localizing content.\u00a0<\/li>\n<li><strong>APT actors used Gemini to support several phases of the attack lifecycle<\/strong>, including researching potential infrastructure and free hosting providers, reconnaissance on target organizations, research into vulnerabilities, payload development, and assistance with malicious scripting and evasion techniques<\/li>\n<\/ul>\n<h3>Burp<\/h3>\n\n<figure class=\"kg-card kg-image-card kg-card-hascaption\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.kybervandals.com\/content\/images\/2025\/05\/burp.png\" class=\"kg-image\" alt=\"No More Secrets: The Use of Offensive AI\" width=\"1530\" height=\"1346\" \/><figcaption><span>src: <\/span><a href=\"https:\/\/x.com\/_JohnHammond\/status\/1912128932016509132?ref=blog.kybervandals.com\"><span>https:\/\/x.com\/_JohnHammond\/status\/1912128932016509132<\/span><\/a><\/figcaption><\/figure>\n\n<h3>SLQMap<\/h3>\n<p>a widely used Tool for SQLInjections, <a href=\"https:\/\/github.com\/atiilla\/sqlmap-ai?ref=blog.kybervandals.com\">became recently an AI-Intergation<\/a>, allowing also unexperienced actores to find any SQLinjection easily<\/p>\n\n<figure class=\"kg-card kg-image-card kg-card-hascaption\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.kybervandals.com\/content\/images\/2025\/05\/sqlmap-1.png\" class=\"kg-image\" alt=\"No More Secrets: The Use of Offensive AI\" width=\"1742\" height=\"892\" \/><figcaption><span>src: <\/span><a href=\"https:\/\/github.com\/atiilla\/sqlmap-ai?tab=readme-ov-file&amp;ref=blog.kybervandals.com#features\"><span>https:\/\/github.com\/atiilla\/sqlmap-ai?tab=readme-ov-file#features<\/span><\/a><\/figcaption><\/figure>\n<p><\/p>\n<h3><\/h3>\n<h2>Wrapup<\/h2>\n\n<p>AI is already widely used; not to craft new attacks, but to support current operations to deliver attacks with a better impact, faster. <\/p>\n\n<ul>\n<li>Reconnaissance: AI can analyze vast datasets\u2014such as network traffic patterns or public system information\u2014to identify high-value or vulnerable targets. Machine learning models could predict which systems are most susceptible to disruption based on historical data or real-time analysis.<\/li>\n<li>Weaponization: AI can assist in crafting more sophisticated malware for botnets, such as bots that evade detection by adapting their behavior or signatures dynamically.<\/li>\n<li>Delivery: AI can optimize the timing, volume, and distribution of malicious traffic. For example, it could coordinate botnet activity to launch synchronized bursts that maximize resource saturation with minimal effort.<\/li>\n<li>Adaptation (Actions on Objectives): Through techniques like reinforcement learning, AI can adjust attack strategies in real-time\u2014altering traffic patterns or intensity based on the target\u2019s defensive responses\u2014to maintain disruption.<\/li>\n<\/ul>\n<p>as one of our colleagues formulated it: <\/p>\n\n<blockquote><p><strong>up to now we had soldiers and weapons on the battleground. The current state of AI-development introduces Exoskeletons for the soldiers; if you dont keep up, they will overrun you.<\/strong> <\/p><\/blockquote>\n<p>so, full circle to the start:<\/p>\n<div class=\"kg-card kg-callout-card kg-callout-card-blue\">\n<div class=\"kg-callout-emoji\">\ud83d\udca1<\/div>\n<div class=\"kg-callout-text\"><b><strong>Buckle up, BlueTeam. <\/strong><\/b>\n<p><b><strong>It will be a fun ride. <\/strong><\/b><\/p><\/div>\n<\/div>\n<h2><\/h2>\n\n<h2>References<\/h2>\n\n<ul>\n<li>NIST: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations <br \/><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/ai\/NIST.AI.100-2e2025.pdf?ref=blog.kybervandals.com\">https:\/\/nvlpubs.nist.gov\/nistpubs\/ai\/NIST.AI.100-2e2025.pdf<\/a><\/li>\n<li>Google: Adversarial Misuse of Generative AI <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/adversarial-misuse-generative-ai?ref=blog.kybervandals.com\">https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/adversarial-misuse-generative-ai<\/a><\/li>\n<li>Anthropic: Detecting and Countering Malicious Uses of Claude: March 2025 <a href=\"https:\/\/www.anthropic.com\/news\/detecting-and-countering-malicious-uses-of-claude-march-2025?ref=blog.kybervandals.com\">https:\/\/www.anthropic.com\/news\/detecting-and-countering-malicious-uses-of-claude-march-2025<\/a><\/li>\n<li>Google: A Framework for Evaluating Emerging Cyberattack Capabilities of AI<br \/><a href=\"https:\/\/arxiv.org\/pdf\/2503.11917?ref=blog.kybervandals.com\">https:\/\/arxiv.org\/pdf\/2503.11917<\/a><\/li>\n<li>SentinelOne: AkiraBot | AI-Powered Bot Bypasses CAPTCHAs, Spams Websites At Scale <br \/><a href=\"https:\/\/www.sentinelone.com\/labs\/akirabot-ai-powered-bot-bypasses-captchas-spams-websites-at-scale\/?ref=blog.kybervandals.com\">https:\/\/www.sentinelone.com\/labs\/akirabot-ai-powered-bot-bypasses-captchas-spams-websites-at-scale\/<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>TL;DR: AI makes the good ones faster, attacks cheaper and the impact more precise. Also, AI is currently implemented into attack-tools, which means no attackvectors will remain hidden, leading to an sharp increase of successrates. Buckle up, BlueTeam Intro + Scope This article will focus on the part where AI is used in attacks or [&hellip;]<\/p>","protected":false},"author":2,"featured_media":1196,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"https:\/\/blog.kybervandals.com\/no-more-secrets-the-use-of-offensive-ai\/","_links_to_target":"_blank"},"categories":[1],"tags":[],"class_list":["post-1195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>No More Secrets: The Use of Offensive AI - avydos.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/avydos.com\/en\/no-more-secrets-the-use-of-offensive-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"No More Secrets: The Use of Offensive AI - avydos.com\" \/>\n<meta property=\"og:description\" content=\"TL;DR: AI makes the good ones faster, attacks cheaper and the impact more precise. Also, AI is currently implemented into attack-tools, which means no attackvectors will remain hidden, leading to an sharp increase of successrates. Buckle up, BlueTeam Intro + Scope This article will focus on the part where AI is used in attacks or [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/avydos.com\/en\/no-more-secrets-the-use-of-offensive-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"avydos.com\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-12T08:39:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T14:20:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1123\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Monja Janneck\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Monja Janneck\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/\"},\"author\":{\"name\":\"Monja Janneck\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393\"},\"headline\":\"No More Secrets: The Use of Offensive AI\",\"datePublished\":\"2025-05-12T08:39:32+00:00\",\"dateModified\":\"2026-03-25T14:20:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/\"},\"wordCount\":1230,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/avydos.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg\",\"articleSection\":[\"Allgemein\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/\",\"url\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/\",\"name\":\"No More Secrets: The Use of Offensive AI - avydos.com\",\"isPartOf\":{\"@id\":\"https:\/\/avydos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg\",\"datePublished\":\"2025-05-12T08:39:32+00:00\",\"dateModified\":\"2026-03-25T14:20:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#primaryimage\",\"url\":\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg\",\"contentUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg\",\"width\":2000,\"height\":1123},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/avydos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"No More Secrets: The Use of Offensive AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/avydos.com\/#website\",\"url\":\"https:\/\/avydos.com\/\",\"name\":\"avydos.com\",\"description\":\"Avydos ist ein DDoS-Stresstest-Selftesting-Service f\u00fcr Security Engineers: DDoS-Bedrohungssimulationen selbstst\u00e4ndig testen unter realen Angriffs-Bedingungen.\",\"publisher\":{\"@id\":\"https:\/\/avydos.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/avydos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/avydos.com\/#organization\",\"name\":\"Avydos by zeroBS GmbH\",\"alternateName\":\"Avydos by zeroBS GmbH\",\"url\":\"https:\/\/avydos.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png\",\"contentUrl\":\"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png\",\"width\":256,\"height\":256,\"caption\":\"Avydos by zeroBS GmbH\"},\"image\":{\"@id\":\"https:\/\/avydos.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393\",\"name\":\"Monja Janneck\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/avydos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g\",\"caption\":\"Monja Janneck\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"No More Secrets: The Use of Offensive AI - avydos.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/avydos.com\/en\/no-more-secrets-the-use-of-offensive-ai\/","og_locale":"en_GB","og_type":"article","og_title":"No More Secrets: The Use of Offensive AI - avydos.com","og_description":"TL;DR: AI makes the good ones faster, attacks cheaper and the impact more precise. Also, AI is currently implemented into attack-tools, which means no attackvectors will remain hidden, leading to an sharp increase of successrates. Buckle up, BlueTeam Intro + Scope This article will focus on the part where AI is used in attacks or [&hellip;]","og_url":"https:\/\/avydos.com\/en\/no-more-secrets-the-use-of-offensive-ai\/","og_site_name":"avydos.com","article_published_time":"2025-05-12T08:39:32+00:00","article_modified_time":"2026-03-25T14:20:23+00:00","og_image":[{"width":2000,"height":1123,"url":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg","type":"image\/jpeg"}],"author":"Monja Janneck","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Monja Janneck","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#article","isPartOf":{"@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/"},"author":{"name":"Monja Janneck","@id":"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393"},"headline":"No More Secrets: The Use of Offensive AI","datePublished":"2025-05-12T08:39:32+00:00","dateModified":"2026-03-25T14:20:23+00:00","mainEntityOfPage":{"@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/"},"wordCount":1230,"commentCount":0,"publisher":{"@id":"https:\/\/avydos.com\/#organization"},"image":{"@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg","articleSection":["Allgemein"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/","url":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/","name":"No More Secrets: The Use of Offensive AI - avydos.com","isPartOf":{"@id":"https:\/\/avydos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#primaryimage"},"image":{"@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg","datePublished":"2025-05-12T08:39:32+00:00","dateModified":"2026-03-25T14:20:23+00:00","breadcrumb":{"@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#primaryimage","url":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg","contentUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2025\/05\/photo-1527430253228-e93688616381-qv54v9.jpeg","width":2000,"height":1123},{"@type":"BreadcrumbList","@id":"https:\/\/avydos.com\/no-more-secrets-the-use-of-offensive-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/avydos.com\/"},{"@type":"ListItem","position":2,"name":"No More Secrets: The Use of Offensive AI"}]},{"@type":"WebSite","@id":"https:\/\/avydos.com\/#website","url":"https:\/\/avydos.com\/","name":"avydos.com","description":"Avydos is a DDoS stress test self-testing service for security engineers: test DDoS threat simulations independently under real attack conditions.","publisher":{"@id":"https:\/\/avydos.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/avydos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/avydos.com\/#organization","name":"Avydos by zeroBS GmbH","alternateName":"Avydos by zeroBS GmbH","url":"https:\/\/avydos.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/avydos.com\/#\/schema\/logo\/image\/","url":"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png","contentUrl":"https:\/\/avydos.com\/wp-content\/uploads\/2023\/11\/android-chrome-256x256-1.png","width":256,"height":256,"caption":"Avydos by zeroBS GmbH"},"image":{"@id":"https:\/\/avydos.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/avydos.com\/#\/schema\/person\/cb5e49332c0c6f21c98f578e0a2b1393","name":"Monja Janneck","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/avydos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f7b27e05b2e57cd9d3dcd5d52bc93ecaf7b931e6bd21fb45d5f4166ac106ce?s=96&d=mm&r=g","caption":"Monja Janneck"}}]}},"_links":{"self":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts\/1195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/comments?post=1195"}],"version-history":[{"count":1,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts\/1195\/revisions"}],"predecessor-version":[{"id":1476,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/posts\/1195\/revisions\/1476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/media\/1196"}],"wp:attachment":[{"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/media?parent=1195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/categories?post=1195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/avydos.com\/en\/wp-json\/wp\/v2\/tags?post=1195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}