The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
☆14Feb 15, 2026Updated last month
Alternatives and similar repositories for social-engineer-toolkit
Users that are interested in social-engineer-toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of Docker resources and projects☆16Nov 15, 2025Updated 4 months ago
- This repository includes supplemental information covered in the Pearson video course titled "The Art of Hacking and Exploitation".☆24Jan 3, 2026Updated 2 months ago
- Who and what to follow in the world of cyber security☆152Sep 23, 2020Updated 5 years ago
- Course Setup for the Cybersecurity Defender in 4 weeks course by Omar Santos☆20Jul 29, 2021Updated 4 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Arduino Library for the Lepton FLiR Thermal Camera Module.☆12Jan 13, 2018Updated 8 years ago
- A curated list of Awesome Threat Intelligence resources☆34Jan 12, 2018Updated 8 years ago
- companion files for my recorded course "Hands-on Ansible"☆17Sep 12, 2024Updated last year
- Flipper Zero Firmware☆13Mar 10, 2022Updated 4 years ago
- ☆14Feb 21, 2025Updated last year
- Intro to R for Datascience workshop content☆16Mar 24, 2022Updated 4 years ago
- ☆23Sep 5, 2023Updated 2 years ago
- Base58 encoding for Go☆39May 5, 2021Updated 4 years ago
- Cross-platform USB thermal camera viewer☆17Feb 9, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- A program to find the real string for your hash. MD5, SHA256, any really. Works really fast, gets to the "aaaa" combo in about 1 second e…☆18Jun 5, 2021Updated 4 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- A collection of IPython notebooks for scraping and cleaning publically available U.S. government data☆14Feb 20, 2017Updated 9 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Cisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.☆31Oct 7, 2019Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Indian Hacking Tool!! Tools to help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user disc…☆16Feb 11, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A server-driven client-side rendering engine written in React, which dynamically allows to render user interfaces using structured JSON d…☆12Feb 14, 2022Updated 4 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 6 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 7 years ago
- A modular and beginner-friendly toolkit to set up your Termux environment with essential tools in one click.☆18Apr 20, 2025Updated 11 months ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Biblioteca utilizada para importar os dados da bolsa de valores brasileira☆18May 9, 2025Updated 10 months ago
- This repo contains resources to help learn and understand penetration testing☆15May 9, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SpyDork is a python dork generator.☆14Aug 1, 2022Updated 3 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Networking module created during Lauro Müller's Terraform course.☆38Dec 22, 2024Updated last year
- Generar virus en Termux. Z Virus es una colección de virus ready made que se puede enviar a su víctima utilizando el enlace. Aquellos que…☆15Aug 1, 2021Updated 4 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Common Lisp toolbox to work with the Monero cryptocurrency☆20Mar 21, 2023Updated 3 years ago