New AI-powered penetration testing framework Villager combines Kali Linux toolsets with DeepSeek AI models to fully automate cyber attack workflows.
Initially developed by the Chinese-based group Cyberspike, this tool has rapidly gained traction since its July 2025 release on the Python Package Index, accumulating over 10,000 downloads within its first two months of availability.
Cybersecurity researchers at Straiker’s AI Research (STAR) team have uncovered a concerning development in AI-powered penetration testing with the discovery of Villager.
The emergence of Villager represents a significant shift in the cybersecurity landscape, with researchers warning it could follow the malicious use of Cobalt Strike, transforming from a legitimate red-team tool into a weapon of choice for malicious threat actors.
Unlike traditional penetration testing frameworks that rely on scripted playbooks, Villager utilizes natural language processing to convert plain text commands into dynamic, AI-driven attack sequences.
Villager operates as a Model Context Protocol (MCP) client, implementing a sophisticated distributed architecture that includes multiple service components designed for maximum automation and minimal detection.
The framework’s core components include an MCP Client Service operating on port 25989 for central message coordination, enhanced decision-making powered by a database containing 4,201 AI system prompts for exploit generation, and on-demand container creation that automatically spawns isolated Kali Linux environments for network scanning and vulnerability assessment.
This tool’s most alarming feature is its ability to evade forensic detection. Containers are configured with a 24-hour self-destruct mechanism that automatically wipes activity logs and evidence, while randomized SSH ports make detection and forensic analysis significantly more challenging.
This transient nature of attack containers, combined with AI-driven orchestration, creates substantial obstacles for incident response teams attempting to track malicious activity.
Villager’s integration with DeepSeek AI models occurs through custom API endpoints hosted at http://gpus.dev.cyberspike.top:8000/v1/chat/completions
, utilizing a proprietary model designated “al-1s-20250421” with GPT-3.5-turbo tokenization.
This AI integration enables the framework to dynamically adjust attack strategies based on discovered system characteristics, automatically launching WPScan when WordPress is detected or shifting to browser automation when API endpoints are identified.

The group behind Villager, known as Cyberspike, first registered their domain cyberspike[.]top on November 27, 2023, under Changchun Anshanyuan Technology Co., Ltd., a Chinese company officially listed as an Artificial Intelligence and Application Software Development provider.
However, investigations reveal concerning gaps in the company’s legitimacy, with no official website available and minimal business traces discoverable through standard corporate databases, Straiker said.
Analysis of archived website snapshots reveals that Cyberspike previously marketed a product suite that included Remote Administration Tool (RAT) capabilities, with version 1.1.7 released in December 2023 featuring “built-in reverse proxy” and “multi-stage generator” functionality.
The entire Cyberspike toolset was essentially a repackaged version of AsyncRAT, a well-established Remote Access Trojan that cybercriminals have widely adopted since its 2019 GitHub release.

The individual behind Villager’s development is identified as @stupidfish001, a former Capture The Flag (CTF) player for the Chinese HSCSEC Team who maintains multiple email addresses .
Automated Attack Scenarios
Villager’s task-based command and control architecture enables complex, multi-stage attacks through its FastAPI interface operating on port 37695.
The framework accepts high-level objectives through natural language commands, which are then automatically decomposed into subtasks with dependency tracking and failure recovery mechanisms.
This approach allows threat actors to submit simple requests like “Test example.com for vulnerabilities” and receive comprehensive automated penetration testing campaigns.
Real-time monitoring capabilities allow operators to track progress through various endpoints, creating a comprehensive command center for AI-driven cyber operations.
This level of automation dramatically reduces the technical expertise required to conduct sophisticated attacks, potentially enabling less-skilled actors to execute advanced intrusion campaigns.
Browser automation capabilities operating on port 8080 handle web-based interactions and client-side testing, while direct code execution through pyeval() and os_execute_cmd() functions provides system-level operational capability.
The combination of these tools, guided by AI-driven decision-making processes, creates attack chains that can adapt in real-time to newly discovered vulnerabilities and system configurations.
The widespread availability of Villager through the official Python Package Index creates significant enterprise security implications.
Organizations face increased risks from more frequent and automated external scanning attempts, faster attack lifecycles that compress detection and response windows, and greater use of off-the-shelf tools in blended attacks that complicate attribution efforts.
The tool’s integration with legitimate development infrastructure also raises supply-chain concerns for organizations with CI/CD pipelines or development workstations that might inadvertently install malicious packages.
Security professionals recommend implementing several critical defensive measures in response to this emerging threat.
Organizations should deploy MCP Protocol Security Gateways to provide real-time inspection and filtering of Model Context Protocol communications, enabling detection of malicious tool invocation patterns and unauthorized AI agent behaviors.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
Source link