Social Engineering Toys
☆37Feb 1, 2016Updated 10 years ago
Alternatives and similar repositories for Social-Engineering-Toys
Users that are interested in Social-Engineering-Toys are comparing it to the libraries listed below
Sorting:
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆360Nov 21, 2017Updated 8 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- metasploitHelper☆253Apr 3, 2020Updated 5 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- VBA Reversed TCP Meterpreter Stager☆65Apr 23, 2018Updated 7 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Help a buddy prank his colleagues! Show your mettle with spoofing emails, malicious attachments, spoofing sms, and spoofing phone calls t…☆102Nov 19, 2016Updated 9 years ago
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- stuff from my ToorCon 2015 talk☆14Oct 27, 2015Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆14Jan 10, 2020Updated 6 years ago
- ☆14Jan 16, 2022Updated 4 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Shell-style script to search exploit-db.com exploits.☆61Sep 7, 2024Updated last year
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- 🀄️ WebShell Backdoor Framework☆16Jun 7, 2018Updated 7 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 10 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆174Oct 11, 2017Updated 8 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- GNURadio based scanner for SmartNet II Digital radio systems.☆26Nov 10, 2013Updated 12 years ago
- ☆15Jul 9, 2020Updated 5 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- This script is for termux beginners who started termux for learn about ethical hacking. In this script contains all important tool for te…☆15Dec 14, 2019Updated 6 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Jul 1, 2019Updated 6 years ago
- A library to make manipulating F5 loadbalancers easy☆15Mar 25, 2016Updated 9 years ago