Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Olympous
Redhotcyber Banner Sito 970x120px Uscita 101125
BruteForceAI: When AI Learns to Hack Logins Better Than a Human Hacker

BruteForceAI: When AI Learns to Hack Logins Better Than a Human Hacker

1 September 2025 15:00

BruteForceAI is a new penetration testing framework that combines artificial intelligence and automation to take brute-force to the next level. Developed by Mor David, the tool uses large language models to automatically analyze login forms and conduct targeted attacks faster and more effectively. Unlike traditional solutions, it does not require complex manual configuration and reduces the risk of human error, simplifying the work of security specialists.

How BruteForceAI works and what it can do

It works in two distinct phases. In the first phase, the LLM analyzes the target page’s HTML and precisely identifies input fields, buttons, and CSS selectors. Next comes the so-called “Smart Attack phase,” during which the tool launches multi-threaded credential tests exploiting the detected selectors. The user can choose between a classic brute-force approach, which tries all possible combinations, or the more discreet password-spray mode, which is useful for reducing the risk of blocking.

Among its strengths are its evasion capabilities. The tool is able to mimic human behavior thanks to timed delays and random jitter, alternate user agents, support the use of proxies, and control browser visibility. This makes attacks more difficult to intercept by automated defense systems. Furthermore, it logs everything in a SQLite database and sends immediate notifications via webhooks to platforms like Slack, Discord, Teams, or Telegram.

For those new to penetration testing, BruteForceAI offers an interesting insight. It’s not just a software for launching attacks, but a tool for understanding how authentication mechanisms work and how vulnerable they are if not adequately protected. Used in authorized contexts, it becomes an ally for learning, testing, and improving cyber defenses without having to write complex code.

ParameterDescriptionDefault
--modeAttack mode (bruteforce/passwordspray)Brute force
--threadsNumber of threads1
--delayDelay between retries (seconds)0
--jitterRandom jitter (seconds)0
--success-exitStop after first successFalse
--force-retryRetry existing attemptsFalse
Attack options to provide at the BruteForceAI prompt

For Red Team and not for Criminals IT experts?

Its adoption is primarily intended for red teams, security researchers, and professionals who perform testing on behalf of others. By automating typically slow and repetitive steps, it drastically reduces analysis times and makes it easier to detect weak login systems. It’s a concrete example of how artificial intelligence can improve established tools, transforming a tedious, manual process into an optimized flow.

From a technical standpoint, installation is not complicated. Python 3.8 or higher, Playwright, and some standard libraries such as requests and PyYAML are required. After cloning the repository from GitHub and running the pip install -r requirements.txt command, you can choose the language model to use: Ollama for local execution or Groq for cloud deployment. Once configured, the tool launches with simple commands for analyzing targets and executing attacks.

It is important to emphasize that BruteForceAI is intended solely for ethical and professional purposes: authorized testing, academic research, and educational activities. Misuse against unauthorized systems is illegal and unethical.

In the right hands, however, it represents a valuable resource for discovering vulnerabilities and strengthening the security of digital systems, introducing new generations of specialists to more intelligent and informed methodologies.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.