paulveillard / cybersecurity-social-engineeringLinks
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engineering in Cybersecurity
☆19Updated 3 years ago
Alternatives and similar repositories for cybersecurity-social-engineering
Users that are interested in cybersecurity-social-engineering are comparing it to the libraries listed below
Sorting:
- A tool designed to analyse email headers☆34Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆12Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- OSINT tool for username, email and domains☆29Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆31Updated 8 months ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 9 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆53Updated 2 months ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆24Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- Terminal based fake identity generator.☆26Updated last year
- The list of write-ups, articles, and PoC of various interesting in context of OSINT☆22Updated 2 months ago
- An automated e-mail OSINT tool☆21Updated 3 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆16Updated 7 months ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Updated 4 years ago
- OSINT tool to find info about your old pages.☆18Updated 3 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- A Simple RedLineStealer☆12Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- A selection of useful Custom Serch Engines for OSINT.☆64Updated 4 months ago
- Single-Clich-Proxy-Chains☆9Updated 4 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 8 months ago
- List of OSINT resources☆15Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 2 years ago