[{"data":1,"prerenderedAt":773},["ShallowReactive",2],{"\u002Fblog\u002F2026-03-24-ai-enhanced-hacking":3},{"id":4,"title":5,"author":6,"body":7,"coverImage":756,"createdAt":757,"description":377,"excerpt":758,"extension":759,"meta":760,"navigation":761,"path":762,"readingTime":763,"seo":768,"stem":769,"subtitle":770,"useFirstImageAsCover":771,"__hash__":772},"blog\u002Fblog\u002F2026-03-24-ai-enhanced-hacking.md","The Practitioner’s Guide to AI-Enhanced Hacking","Andrew Pratt",{"type":8,"value":9,"toc":746},"minimark",[10,14,17,20,67,71,74,96,99,102,147,167,171,174,177,180,183,186,189,204,207,210,219,222,242,245,248,257,283,290,299,302,305,353,356,364,371,436,443,446,455,458,507,516,519,522,525,528,558,561,569,572,575,578,581,607,610,613,616,625,651,654,662,687,693,715,719,722,725,728,731,742],[11,12,13],"p",{},"For decades, security researchers have sought to optimize the efficacy and efficiency of their workflows by carefully curating and orchestrating a combination of tools such as vulnerability scanners, web crawlers, and other automation scripts. However, even the most curated toolkits and configurations are inherently constrained by the functionality of each individual component.",[11,15,16],{},"Advancements in the field of AI have provided a dynamic solution. With the ability to understand natural language and gain a contextual understanding of the task at hand, AI acts as an intelligent collaborator rather than a fixed utility.",[11,18,19],{},"In this article, we will explore the various ways in which AI can be leveraged to enhance your hacking workflow.",[21,22,23,31,37,43,49,55,61],"ul",{},[24,25,26],"li",{},[27,28,30],"a",{"href":29},"#chat-bots","Chat Bots",[24,32,33],{},[27,34,36],{"href":35},"#ai-agents","AI Agents",[24,38,39],{},[27,40,42],{"href":41},"#mcp-servers","MCP Servers",[24,44,45],{},[27,46,48],{"href":47},"#skills","Skills",[24,50,51],{},[27,52,54],{"href":53},"#local-models","Local Models",[24,56,57],{},[27,58,60],{"href":59},"#ai-frameworks","AI Frameworks",[24,62,63],{},[27,64,66],{"href":65},"#ai-extensions","AI Extensions",[68,69,30],"h2",{"id":70},"chat-bots",[11,72,73],{},"Chat bots are large language models (LLMs) that allow you to converse with AI just as you would with a human being and are the most accessible way to get started with AI-enhanced hacking.",[11,75,76,77,83,84,89,90,95],{},"The web applications of AI providers such as ",[27,78,82],{"href":79,"rel":80},"https:\u002F\u002Fclaude.ai\u002F",[81],"nofollow","Claude",", ",[27,85,88],{"href":86,"rel":87},"https:\u002F\u002Fchatgpt.com\u002F",[81],"ChatGPT",", and ",[27,91,94],{"href":92,"rel":93},"https:\u002F\u002Fgemini.google.com\u002F",[81],"Gemini"," load a user-friendly interface for entering discussions with chat bots.",[11,97,98],{},"Chat bots can act as knowledgeable tutors to help you gain a better understanding of concepts and techniques you are trying to learn - including those related to cybersecurity.",[11,100,101],{},"However, their true power lies in their ability to proficiently read and write code at machine speed with prompts similar to:",[21,103,104,110,115,120,125],{},[24,105,106],{},[107,108,109],"em",{},"\"Discover sources and sinks for user input and check for insufficient validation, sanitization, encoding, or faulty regex checks.\"",[24,111,112],{},[107,113,114],{},"\"Identify any referenced endpoints and request parameters.\"",[24,116,117],{},[107,118,119],{},"\"Check for any exposed secrets such as credentials, API keys, or authentication tokens that have accidentally been left in these files\".",[24,121,122],{},[107,123,124],{},"\"Identify feature flags or toggles that could expose additional functionality.\"",[24,126,127],{},[107,128,129,130,134,135,138,139,142,143,146],{},"\"Write a Python 3 script that will make the following request to ",[131,132,133],"code",{},"https:\u002F\u002Fapi.example.com\u002Fendpoint",", parse the JSON body data of the response and collect every string value where the key is ",[131,136,137],{},"\"uuid\""," and the value starts with ",[131,140,141],{},"platform:org:",", and write the values to a ",[131,144,145],{},"uuid-wordlist.txt"," file.\"",[11,148,149,150,154,155,160,161,166],{},"As a demonstration, by providing the HTML document returned in the response to the ",[151,152,153],"strong",{},"GET \u002F?name=test HTTP\u002F1.1"," request from ",[27,156,159],{"href":157,"rel":158},"https:\u002F\u002Flabs.caido.io\u002Fhubs\u002Freflected-xss",[81],"Caido's Reflected XSS lab"," to the chatbot of the AI-integrated, developer-focused IDE ",[27,162,165],{"href":163,"rel":164},"https:\u002F\u002Fcursor.com\u002F",[81],"Cursor",", the model is able to identify both XSS vulnerabilities and provide working payloads.",[168,169],"img",{"src":170},"\u002Fimages\u002Fblog\u002F2026-03-24-ai-enhanced-hacking\u002Fcursor-xss.webp",[11,172,173],{},"Code snippet review and generation, tasks that previously required time and effort to manually complete, can now be accomplished by an AI companion, freeing you to focus on other workloads. The time saved affords the luxury of iterating through code specific to individual targets instead of relying on generic, one-size-fits-all solutions.",[11,175,176],{},"This can be the difference between a vulnerability report being passed to a security team rather than being marked as a duplicate.",[68,178,36],{"id":179},"ai-agents",[11,181,182],{},"Although chat bots are a powerful tool, their capabilities are limited by the back and forth nature of conversation-based interactions. Manually obtaining and providing content so an agent can gain the context it needs to achieve a desired outcome can be time-consuming and, therefore, inefficient.",[11,184,185],{},"To address this limitation, LLMs can be configured to carry out sequences of actions to accomplish multi-step workflows with a high degree of independence. Once a model is equipped with the necessary resources to execute a workflow autonomously, it becomes an AI \"agent\".",[11,187,188],{},"In contrast to automation solutions of the past, AI agents are more capable of adjusting to the variable parameters of a workflow and are able to make intelligent decisions based on the specific context of the task at hand.",[11,190,191,192,197,198,203],{},"In addition to Cursor, other AI tools like ",[27,193,196],{"href":194,"rel":195},"https:\u002F\u002Fclaude.com\u002Fproduct\u002Fclaude-code",[81],"Claude Code"," and ",[27,199,202],{"href":200,"rel":201},"https:\u002F\u002Fopenai.com\u002Fcodex\u002F",[81],"Codex"," can be easily configured with agentic properties.",[11,205,206],{},"In the remainder of this article, we will explore the various ways LLMs can be extended to become AI agents.",[68,208,42],{"id":209},"mcp-servers",[11,211,212,213,218],{},"The recent introduction of the ",[27,214,217],{"href":215,"rel":216},"https:\u002F\u002Fmodelcontextprotocol.io\u002Fdocs\u002Fgetting-started\u002Fintro",[81],"Model Context Protocol (MCP)"," has provided a standardization for connecting AI agents to external systems.",[11,220,221],{},"Based on the client-server architecture model, the key participants of the protocol are the:",[21,223,224,230,236],{},[24,225,226,229],{},[151,227,228],{},"MCP Host",": The AI application that coordinates and manages one or multiple MCP clients.",[24,231,232,235],{},[151,233,234],{},"MCP Client",": A component that maintains a connection to an MCP server and obtains context from an MCP server for the MCP host to use.",[24,237,238,241],{},[151,239,240],{},"MCP Server",": A program that provides context to MCP clients.",[168,243],{"src":244},"\u002Fimages\u002Fblog\u002F2026-03-24-ai-enhanced-hacking\u002Fmcp-diagram.webp",[11,246,247],{},"Once a connection is established, the resources\u002Ffunctionality made available by the MCP server can be accessed by the AI agent of the MCP host.",[11,249,250,251,256],{},"For instance, the community-developed ",[27,252,255],{"href":253,"rel":254},"https:\u002F\u002Fgithub.com\u002Fc0tton-fluff\u002Fcaido-mcp-server",[81],"Caido MCP Server"," allows AI agents to instantiate authenticated client connections to your Caido instance. Once connected, the agent gains controlled access to project data and a suite of tools it can use to control Caido when instructed to do so with prompts similar to:",[21,258,259,268,273,278],{},[24,260,261],{},[107,262,263,264,267],{},"\"List all POST requests to the ",[131,265,266],{},"\u002Fapi"," endpoint.\"",[24,269,270],{},[107,271,272],{},"\"Send this request in Replay with a modified user ID.\"",[24,274,275],{},[107,276,277],{},"\"Show fuzzing results from the first Automate session.\"",[24,279,280],{},[107,281,282],{},"\"Is request interception currently enabled?\"",[11,284,285],{},[27,286,289],{"href":287,"rel":288},"https:\u002F\u002Fdocs.caido.io\u002Fapp\u002Ftutorials\u002Fmcp.html",[81],"Learn how to connect an AI agent to Caido with the Caido MCP Server.",[11,291,292,293,298],{},"Currently, there are 27,518 MCP servers listed on ",[27,294,297],{"href":295,"rel":296},"https:\u002F\u002Fmcpmarket.com\u002F",[81],"MCP Market",", a combination of both official and community contributions.",[11,300,301],{},"MCP servers allow you to extend the capabilities of your AI agents in a modular manner. With such a vast selection, it is likely that you will be able to customize your agents with exactly what they need to automate sizable portions of your security assessment workflows.",[11,303,304],{},"Some security-centric servers that are available include:",[21,306,307,327,345],{},[24,308,309,314,315,320,321,326],{},[27,310,313],{"href":311,"rel":312},"https:\u002F\u002Fgithub.com\u002F0xKoda\u002FWireMCP",[81],"WireMCP",": An MCP server for ",[27,316,319],{"href":317,"rel":318},"https:\u002F\u002Fwww.wireshark.org\u002F",[81],"Wireshark","\u002F",[27,322,325],{"href":323,"rel":324},"https:\u002F\u002Fwww.wireshark.org\u002Fdocs\u002Fman-pages\u002Ftshark.html",[81],"TShark",".",[24,328,329,334,335,197,340,326],{},[27,330,333],{"href":331,"rel":332},"https:\u002F\u002Fgithub.com\u002FBurtTheCoder\u002Fmcp-shodan",[81],"Shodan MCP Server",": An MCP server for querying the ",[27,336,339],{"href":337,"rel":338},"https:\u002F\u002Fshodan.io\u002F",[81],"Shodan API",[27,341,344],{"href":342,"rel":343},"https:\u002F\u002Fcvedb.shodan.io\u002F",[81],"Shodan CVEDB",[24,346,347,352],{},[27,348,351],{"href":349,"rel":350},"https:\u002F\u002Fgithub.com\u002Fccq1\u002Fawsome_kali_mcpservers",[81],"Awesome Kali MCP Servers",": A collection of MCP servers designed specifically for Kali Linux.",[68,354,48],{"id":355},"skills",[11,357,358,363],{},[27,359,362],{"href":360,"rel":361},"https:\u002F\u002Fagentskills.io\u002Fhome",[81],"Agent Skills"," is an open standard for extending the capabilities of AI agents that is supported by leading AI providers. Compared to MCP servers, configuring skills gives you more fine-grained control over how an agent operates and lets you expand the knowledge base of AI models beyond their training dataset.",[11,365,366,367,370],{},"At its most basic, a skill is a folder that contains a ",[151,368,369],{},"SKILL.md"," file that provides an agent with metadata such as the skill name, a description, and when it should be used, as well as instructions to follow. A skill folder can also include optional, categorical sub-folders for additional content to provide an agent with like scripts, references, and assets.",[372,373,378],"pre",{"className":374,"code":375,"language":376,"meta":377,"style":377},"language-txt shiki shiki-themes github-light github-dark","my-skill\u002F\n├── SKILL.md\n├── scripts\u002F\n    ├── script.py\n├── references\u002F\n    ├── documentation.md\n└── assets\u002F\n    ├── template.md\n    ├── diagram.png\n","txt","",[131,379,380,388,394,400,406,412,418,424,430],{"__ignoreMap":377},[381,382,385],"span",{"class":383,"line":384},"line",1,[381,386,387],{},"my-skill\u002F\n",[381,389,391],{"class":383,"line":390},2,[381,392,393],{},"├── SKILL.md\n",[381,395,397],{"class":383,"line":396},3,[381,398,399],{},"├── scripts\u002F\n",[381,401,403],{"class":383,"line":402},4,[381,404,405],{},"    ├── script.py\n",[381,407,409],{"class":383,"line":408},5,[381,410,411],{},"├── references\u002F\n",[381,413,415],{"class":383,"line":414},6,[381,416,417],{},"    ├── documentation.md\n",[381,419,421],{"class":383,"line":420},7,[381,422,423],{},"└── assets\u002F\n",[381,425,427],{"class":383,"line":426},8,[381,428,429],{},"    ├── template.md\n",[381,431,433],{"class":383,"line":432},9,[381,434,435],{},"    ├── diagram.png\n",[11,437,438],{},[27,439,442],{"href":440,"rel":441},"https:\u002F\u002Fgithub.com\u002Fanthropics\u002Fskills\u002Ftree\u002Fmain\u002Fskills",[81],"View examples of skill folders.",[11,444,445],{},"While skills can be custom, pre-written skills are also available from various providers.",[11,447,448,449,454],{},"Currently, there are 90,121 skills listed on ",[27,450,453],{"href":451,"rel":452},"https:\u002F\u002Fskills.sh\u002F",[81],"skills.sh",", a repository managed by Vercel.",[11,456,457],{},"Some security-centric skills available include:",[21,459,460,478,486,494],{},[24,461,462,467,468,473,474],{},[27,463,466],{"href":464,"rel":465},"https:\u002F\u002Fdocs.caido.io\u002Fapp\u002Ftutorials\u002Fskills.html#caido-skills",[81],"Caido Skills",": Our official skill built on the ",[27,469,472],{"href":470,"rel":471},"https:\u002F\u002Fgithub.com\u002Fcaido\u002Fsdk-js\u002Ftree\u002Fmain\u002Fpackages\u002Fsdk-client",[81],"@caido\u002Fsdk-client"," package, that gives AI agents complete coverage of Caido's API. ",[27,475,477],{"href":476},"\u002Fblog\u002F2026-03-06-caido-skill","Check out our other blog post on Caido Skills to learn how security researcher Joseph Thacker leverages AI to discover real-world vulnerabilities.",[24,479,480,485],{},[27,481,484],{"href":482,"rel":483},"https:\u002F\u002Fgithub.com\u002Ftrailofbits\u002Fskills",[81],"Trail of Bits",": A collection of skills for smart contract security, code auditing, malware analysis, reverse engineering, mobile security, and more, with Burp Suite support.",[24,487,488,493],{},[27,489,492],{"href":490,"rel":491},"https:\u002F\u002Fgithub.com\u002Ftrilwu\u002Fsecskills",[81],"SecSkills",": Multiple skills that equip six AI agents with the tooling they need to conduct reconnaissance and security testing against web\u002Fmobile applications, cloud environments, and smart contracts.",[24,495,496,501,502,506],{},[27,497,500],{"href":498,"rel":499},"https:\u002F\u002Fgithub.com\u002Fagamm\u002Fclaude-code-owasp",[81],"OWASP",": A skill that provides agents with comprehensive documentation covering all 2025 and 2026 ",[27,503,500],{"href":504,"rel":505},"https:\u002F\u002Fowasp.org\u002F",[81]," standards.",[11,508,509,510,515],{},"To learn more about the structure of a skill and how to get started with creating your own, check out Anthropic's ",[27,511,514],{"href":512,"rel":513},"https:\u002F\u002Fresources.anthropic.com\u002Fhubfs\u002FThe-Complete-Guide-to-Building-Skill-for-Claude.pdf",[81],"The Complete Guide to Building Skill for Claude"," guide.",[68,517,54],{"id":518},"local-models",[11,520,521],{},"AI models can also be ran locally on your own device. This option provides offline availability and avoids any data from being sent to a third-party.",[11,523,524],{},"Locally ran models also aren't subject to rate limits and costs which can be a significant advantage when working with large datasets or complex tasks.",[11,526,527],{},"Some popular local model series include:",[21,529,530,537,544,551],{},[24,531,532],{},[27,533,536],{"href":534,"rel":535},"https:\u002F\u002Fgithub.com\u002Fmeta-llama\u002Fllama-models\u002Ftree\u002Fmain",[81],"Llama",[24,538,539],{},[27,540,543],{"href":541,"rel":542},"https:\u002F\u002Fgithub.com\u002FQwenLM",[81],"Qwen",[24,545,546],{},[27,547,550],{"href":548,"rel":549},"https:\u002F\u002Fmistral.ai\u002F",[81],"Mistral",[24,552,553],{},[27,554,557],{"href":555,"rel":556},"https:\u002F\u002Fwww.deepseek.com\u002Fen\u002F",[81],"DeepSeek",[11,559,560],{},"However, local models also come with operational trade-offs. Your device needs to be capable of running the model as they are hardware intensive. You are also responsible for managing dependencies and updates on your own. They are also typically not as capable as proprietary, hosted models which can lead to slower response times and reduced accuracy.",[11,562,563,564,326],{},"To get started with local models, check out ",[27,565,568],{"href":566,"rel":567},"https:\u002F\u002Fmachinelearningmastery.com\u002Fbuilding-ai-agents-with-local-small-language-models\u002F",[81],"Building AI Agents with Local Small Language Models",[68,570,60],{"id":571},"ai-frameworks",[11,573,574],{},"If you want more structure than improvising in chat, wiring MCP servers yourself, and maintaining scattered one-off scripts, full AI frameworks package workflows, reusable task patterns, and integrations into a single stack.",[11,576,577],{},"With the ability to deploy sub-agents, schedule tasks, and communicate across a variety of channels, frameworks are out-of-the-box solutions that you can adopt immediately.",[11,579,580],{},"Some exemplary frameworks are:",[21,582,583,591,599],{},[24,584,585,590],{},[27,586,589],{"href":587,"rel":588},"https:\u002F\u002Fgithub.com\u002Fdanielmiessler\u002FPersonal_AI_Infrastructure?utm_source=executiveoffense.beehiiv.com&utm_medium=referral&utm_campaign=killer-agent-framework-features",[81],"PAI",": Developed by security researcher Daniel Miessler, this framework centers on your real-world goals, refines outputs against full context, and learns iteratively.",[24,592,593,598],{},[27,594,597],{"href":595,"rel":596},"https:\u002F\u002Fgithub.com\u002FGH05TCREW\u002Fpentestagent",[81],"PentestAgent",": An AI agent framework for black-box security testing, supporting bug bounty, red-team, and penetration testing workflows.",[24,600,601,606],{},[27,602,605],{"href":603,"rel":604},"https:\u002F\u002Fgithub.com\u002Fbugbasesecurity\u002Fpentest-copilot",[81],"Pentest Copilot",": An AI-powered browser based ethical hacking assistant tool designed to streamline security assessments.",[11,608,609],{},"Setup and configuration can very greatly depending on the framework you choose to use, so be sure to read the README.md file or documentation to get started.",[68,611,66],{"id":612},"ai-extensions",[11,614,615],{},"Instead of manually providing context of your workload to an external chatbot\u002Fagent application, a number of extensions are available that integrate AI directly in the user interfaces of security applications.",[11,617,618,619,624],{},"In addition to the ",[27,620,623],{"href":621,"rel":622},"https:\u002F\u002Fdocs.caido.io\u002Fapp\u002Fquickstart\u002Fassistant.html",[81],"Assistant",", Caido's native AI feature, there are currently three AI-related Caido plugins available for installation:",[21,626,627,635,643],{},[24,628,629,634],{},[27,630,633],{"href":631,"rel":632},"https:\u002F\u002Fdocs.caido.io\u002Fapp\u002Ftutorials\u002Fshift.html#configuration",[81],"Shift",": The official AI plugin that implements a floating prompt window, agentic capabilities, and skills in Caido.",[24,636,637,642],{},[27,638,641],{"href":639,"rel":640},"https:\u002F\u002Fgithub.com\u002FSlonser\u002FEbka-Caido-AI\u002Ftree\u002Fmain",[81],"Ebka AI Assistant",": A plugin that provides AI agents with over 30 tools for operating Caido.",[24,644,645,650],{},[27,646,649],{"href":647,"rel":648},"https:\u002F\u002Fgithub.com\u002Fvvvvvvvvvvel\u002FVibeHacking",[81],"Vibe Hacking",": A plugin that gives you the ability to launch an MCP server directly from Caido's user-interface that exposes tools on a permissive basis.",[168,652],{"src":653},"\u002Fimages\u002Fblog\u002F2026-03-24-ai-enhanced-hacking\u002Fshift.webp",[11,655,656,661],{},[27,657,660],{"href":658,"rel":659},"https:\u002F\u002Fportswigger.net\u002Fburp\u002Fai",[81],"Burp AI"," is the native Burp Suite integration, built into the Repeater interface. The BApp store, Burp Suite's extension repository, also includes:",[21,663,664,671,679],{},[24,665,666,670],{},[27,667,240],{"href":668,"rel":669},"https:\u002F\u002Fgithub.com\u002FPortSwigger\u002Fmcp-server",[81],": An official PortSwigger plugin that exposes Burp Suite functionality through an MCP server.",[24,672,673,678],{},[27,674,677],{"href":675,"rel":676},"https:\u002F\u002Fgithub.com\u002Fportswigger\u002Freport-lm",[81],"ReportLM",": Another official plugin that leverages Burp AI to generate custom reports from identified security issues.",[24,680,681,686],{},[27,682,685],{"href":683,"rel":684},"https:\u002F\u002Fgithub.com\u002Fportswigger\u002Fai-prompt-fuzzer",[81],"AI Prompt Fuzzer",": A plugin that automates prompt injection vulnerability testing against other AI applications.",[11,688,689,692],{},[151,690,691],{},"As with any integration, ensure to take the security of MCP servers, skills, and extensions into consideration",":",[21,694,695,700,705,710],{},[24,696,697],{},[151,698,699],{},"Only install servers from trusted sources.",[24,701,702],{},[151,703,704],{},"Review the code before installation.",[24,706,707],{},[151,708,709],{},"Follow the principle of least privilege when granting an agent access to filesystem locations and permissions to run commands.",[24,711,712],{},[151,713,714],{},"Version pin packages to avoid potential supply chain attacks.",[68,716,718],{"id":717},"a-new-era","A New Era",[11,720,721],{},"The mass adoption of AI is reshaping the technology industry as a whole and security is one of the first domains feeling its full impact.",[11,723,724],{},"More than a new tool, AI introduces a new working model: workflows are no longer constrained to rigid, single-purpose automation, but can be adapted to context, refined through feedback, and tailored to each individual's objectives.",[11,726,727],{},"That flexibility means no two implementations will look the same. The quality of outcomes now depends less on access to one \"perfect\" toolkit and more on your ability to think clearly, break problems into logical steps, and communicate intent precisely to an AI agent. Essentially, creativity is now a major driving factor when it comes to hacking targets successfully.",[11,729,730],{},"Those that develop these skills early will be able to keep pace with the industry as automation becomes increasingly prevalent and reliable.",[11,732,733],{},[107,734,735,736,741],{},"If you have unique insights or experience in using AI to hack that weren't covered in this post, get in touch with us on ",[27,737,740],{"href":738,"rel":739},"https:\u002F\u002Flinks.caido.io\u002Fwww-discord",[81],"Discord"," so we can share it with the community!",[743,744,745],"style",{},"html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":377,"searchDepth":390,"depth":390,"links":747},[748,749,750,751,752,753,754,755],{"id":70,"depth":390,"text":30},{"id":179,"depth":390,"text":36},{"id":209,"depth":390,"text":42},{"id":355,"depth":390,"text":48},{"id":518,"depth":390,"text":54},{"id":571,"depth":390,"text":60},{"id":612,"depth":390,"text":66},{"id":717,"depth":390,"text":718},"\u002F__og-image__\u002Fstatic\u002Fblog\u002F2026-03-24-ai-enhanced-hacking\u002Fog.png","2026-03-24",null,"md",{},true,"\u002Fblog\u002F2026-03-24-ai-enhanced-hacking",{"text":764,"minutes":765,"time":766,"words":767},"10 min read",9.09,545400,1818,{"title":5,"description":377},"blog\u002F2026-03-24-ai-enhanced-hacking","Learn how AI can elevate your hacking workflows.",false,"VqV-cRxz82gWrO4dwu30F3RN3FJQmCeGTk4ZWXcWg2w",1777644199109]