Gathers public information on companies to highlight social engineering risk.
☆30May 25, 2016Updated 9 years ago
Alternatives and similar repositories for social-vuln-scanner
Users that are interested in social-vuln-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Jul 9, 2012Updated 13 years ago
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆31Mar 11, 2026Updated last month
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Social Engineering Browser Update Attack.☆58Nov 12, 2023Updated 2 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It oc…☆17Jan 21, 2023Updated 3 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Scanner and Exploit for Magento 1.9☆14Sep 28, 2015Updated 10 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- Social engineering credential harvester☆17Oct 4, 2021Updated 4 years ago
- MASS CVE-2021-41773☆29Nov 14, 2023Updated 2 years ago
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 12 years ago
- Social Engineering Definition. Social engineering is a manipulation technique that exploits human error to gain private information, acce…☆23May 26, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- some expolit wrote by me☆15May 4, 2020Updated 5 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Social Engineering Toys☆38Feb 1, 2016Updated 10 years ago
- Detect and trap IP scanners☆11Mar 26, 2019Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Upload external IP so you can find your devices elsewhere☆16Mar 25, 2024Updated 2 years ago
- A facebook profile and reconnaissance system☆57Sep 21, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆13Jul 24, 2022Updated 3 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Apr 5, 2017Updated 9 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 10 years ago
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago
- OSINT Web Page Finder☆11May 20, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- This is a basic Python script that accepts a website's url in string format to initiate a DDoS attack. For educational purposes only.☆14Jan 3, 2015Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Social Engineering Tool Oriented to facebook☆58Apr 7, 2017Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Jun 3, 2015Updated 10 years ago
- CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.☆24Jan 15, 2020Updated 6 years ago
- Mirror of https://github.com/iSECPartners/ios-ssl-kill-switch/☆16Dec 28, 2015Updated 10 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- An AI-CyberSecurity Bot that assists security analysts in incident investigations☆41Feb 21, 2025Updated last year