yogsec / Social-Engineering-TacticsLinks
Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware and stay secure!
☆44Updated 8 months ago
Alternatives and similar repositories for Social-Engineering-Tactics
Users that are interested in Social-Engineering-Tactics are comparing it to the libraries listed below
Sorting:
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆55Updated 8 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆153Updated 3 weeks ago
- ☆133Updated 6 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆83Updated last week
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆214Updated 3 months ago
- ☆138Updated 2 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 11 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆160Updated 8 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated last year
- DPULSE - Tool for complex approach to domain OSINT☆155Updated this week
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆141Updated 11 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 4 months ago
- automated Open Source Intelligence gathering☆169Updated 3 weeks ago
- Darkweb_Crawler - is an advanced, stealthy Python-based dark web intelligence platform designed for authorized security professionals and…☆84Updated last week
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆226Updated 8 months ago
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆66Updated 4 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆67Updated 4 months ago
- A blind SQL injection brute forcer☆113Updated 7 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆50Updated 8 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆62Updated 4 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆211Updated 3 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆112Updated 3 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 11 months ago
- ☆244Updated 2 months ago
- ☆142Updated 6 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 8 months ago
- Analyze Android native `.so` files☆114Updated 4 months ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆34Updated 3 months ago
- 🕵️ Email osint tool☆63Updated 2 years ago