Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{180226,
author = {Priyanka V Guadada and Anirudh L and Gurudatta C S and Ranjith S Shreigar and Chirag Gowda and C Nandini},
title = {BlackHatNet: An Intelligent Offensive Framework for Penetration Testing using Machine Learning and Threat Modeling},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {12},
number = {1},
pages = {676-680},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=180226},
abstract = {In the rapidly evolving landscape of
cybersecurity, offensive security has become a
proactive approach to identifying and mitigating
vulnerabilities before malicious actors can exploit
them. This paper presents the design and development
of
an AI-powered offensive security agent
(BlackHatNet) that leverages artificial intelligence to
automate and enhance penetration testing and threat
simulation. The proposed system integrates machine
learning models with reconnaissance, vulnerability
analysis, and exploitation modules, enabling adaptive
and intelligent decision-making in real-time attack
scenarios. Unlike traditional tools, BlackHatNet can
learn from historical attack data, predict likely targets
and vulnerabilities, and dynamically choose optimal
attack vectors. This not only improves the efficiency
and accuracy of offensive assessments but also reduces
the manual effort and time required for red teaming
exercises. Experimental evaluations demonstrate the
agent's capability to uncover complex vulnerabilities in
simulated environments, highlighting its potential as a
next-generation tool in cybersecurity operations and
ethical hacking.},
keywords = {Offensive Security, Penetration Testing, AI in Cybersecurity, Reconnaissance Red Team Automation, Automation, Vulnerability Assessment, Exploit Generation, Reinforcement Learning, Post-Exploitation Analysis, AI- Driven Threat Simulation, Cyber Attack Automation, Adaptive Exploitation, Intelligent Security Agent, Ethical Hacking Tools, Machine Learning in Security},
month = {June},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry