From Checklist-based Pentesting to Autonomous Ethical Hacking: What Changed for CEGID