In this article, we give a quick introduction on how deep learning in security works and explore the basic methods of exploita- tion, but also look at the offensive capabilities deep learning enabled tools provide. All presented attacks, such as backdooring, GPU-based buffer overflows or automated b