Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware and stay secure!
☆46Jan 25, 2026Updated 2 months ago
Alternatives and similar repositories for Social-Engineering-Tactics
Users that are interested in Social-Engineering-Tactics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆59Jan 25, 2026Updated last month
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆52Jan 25, 2026Updated last month
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated last month
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆91Jan 25, 2026Updated last month
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆38Jan 26, 2026Updated last month
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆65Jan 25, 2026Updated last month
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 9 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆67Mar 31, 2025Updated 11 months ago
- Block abused TLDs in Tenant Allow BlockList☆14Jan 21, 2026Updated 2 months ago
- A curated list of awesome Web3 Security.☆27Aug 5, 2025Updated 7 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆100Jan 25, 2026Updated last month
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- Python implementation of the CaRT library for (un)inerting files.☆52Feb 10, 2025Updated last year
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆25Mar 31, 2025Updated 11 months ago
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 6 months ago
- 免费的指纹浏览器,Mask the most advanced open-source browser fingerprinting library,专门定制的141版本chromium指纹浏览器用来过FingerPrintJS和其pro付费版本,支持HTTP密码代理☆24Dec 18, 2025Updated 3 months ago
- RF front end for a software defined receiver☆12May 31, 2025Updated 9 months ago
- Windows forensics Engine☆60Mar 17, 2026Updated last week
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆47Apr 7, 2025Updated 11 months ago
- Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual …☆68Mar 3, 2026Updated 3 weeks ago
- RevEng.AI Radare2 Plugin☆17Jul 13, 2025Updated 8 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 8 months ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- Load your data into burp☆11Apr 26, 2023Updated 2 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Monitoring a high precision 10MHz GPS disciplined oscillator (GPSDO)☆14Dec 1, 2024Updated last year
- ☆35Oct 19, 2025Updated 5 months ago
- ☆40Nov 29, 2024Updated last year
- 🫂 A toolkit that adds extra functionality to niri☆31Jan 11, 2026Updated 2 months ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago