Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Home/CyberSecurity News/GHOSTCREW: AI Red Team Toolkit for AI-based Penetration
CyberSecurity News

GHOSTCREW: AI Red Team Toolkit for AI-based Penetration

GHOSTCREW, an open-source toolkit, has emerged to assist Red Team Toolkitand penetration testers. This AI-powered assistant leverages large language models, integrates the MCP protocol, and supports...

David kimber
David kimber
January 5, 2026 2 Min Read
12 0

GHOSTCREW, an open-source toolkit, has emerged to assist Red Team Toolkitand penetration testers. This AI-powered assistant leverages large language models, integrates the MCP protocol, and supports the optional RAG architecture. It enables users to orchestrate security tools through natural-language prompts.

Developed by GH05TCREW, the project has garnered over 450 stars on GitHub, signaling strong interest in the infosec community. It supports autonomous agent modes, predefined workflows, and markdown report generation, streamlining complex pentests from reconnaissance to exploitation.​

GHOSTCREW excels in natural language interaction, allowing users to query network details or launch scans conversationally while maintaining multi-turn dialogue history.

The toolkit manages MCP servers via an interactive menu, enabling seamless configuration of tools stored in mcp.json. Advanced capabilities include Pentesting Task Trees (PTT) for dynamic decision-making in agent mode, streaming responses, and file-aware integration that pulls wordlists or payloads from a local knowledge directory.​

Users benefit from optional RAG enhancements for precise, context-aware replies and configurable LLM parameters, with GPT-4o as the default via the OpenAI API.​

Integrated Security Tools

GHOSTCREW connects to 18 MCP-compatible tools for comprehensive assessments:

Tool Purpose
Nmap Network discovery and auditing​
Metasploit Exploit execution and payloads​
FFUF Web fuzzing​
SQLMap SQL injection exploitation​
Nuclei Vulnerability scanning​
Hydra Brute-force attacks​
Masscan High-speed port scanning​

Additional tools like Amass, Katana, and Scout Suite cover subdomain enum, crawling, and cloud audits. Upcoming additions include BloodHound and Gobuster.​

Installation starts with cloning the repo at github.com/GH05TCREW/ghostcrew, creating a venv, and pip installing requirements.txt. Node.js and uv are needed for full tool support; without them, chat mode still works.​

Launch via python main.py, configure MCP tools on startup, and choose chat, workflow, or agent modes. Multi-line inputs via ‘multi’ command handle intricate queries, with ‘quit’ for exit.​

This toolkit lowers barriers for bug bounty hunters and threat analysts by automating workflows and generating structured reports with findings and recommendations.

As AI agents evolve, GHOSTCREW positions pentesters to scale operations efficiently, blending human intuition with machine precision in black-box testing scenarios. Security teams should monitor their growth, given the rising demand for agentic red teaming tools.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Threat Actor Leaks NordVPN Salesforce Database Source Codes

Next Post

Eaton Vulnerabilities Allow Arbitrary Code Execution on Hosts

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us