Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware and stay secure!
☆47Jan 25, 2026Updated last month
Alternatives and similar repositories for Social-Engineering-Tactics
Users that are interested in Social-Engineering-Tactics are comparing it to the libraries listed below
Sorting:
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated last month
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆51Jan 25, 2026Updated last month
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated last month
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆88Jan 25, 2026Updated last month
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆58Mar 31, 2025Updated 11 months ago
- This tool combines the power of Ollama (Mistral) with your terminal to turn natural language into real shell commands. Whether you want t…☆22Jan 25, 2026Updated last month
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆61Jan 25, 2026Updated last month
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 3 weeks ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆19Mar 6, 2025Updated 11 months ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆34Jan 26, 2026Updated last month
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 8 months ago
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆16Nov 11, 2020Updated 5 years ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆236Jan 25, 2026Updated last month
- A curated list of awesome Web3 Security.☆27Aug 5, 2025Updated 7 months ago
- easy open http, tcp ports from localhost to internet.☆27Nov 16, 2025Updated 3 months ago
- Complete Malware Index - Use at your own Risk!☆20Sep 2, 2024Updated last year
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆99Jan 25, 2026Updated last month
- This is a collection of Worms for educational purposes☆34Jul 17, 2025Updated 7 months ago
- Python implementation of the CaRT library for (un)inerting files.☆49Feb 10, 2025Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆56Jan 25, 2026Updated last month
- ⚒️ My Ansible playbooks and roles that I use to automate the configuration and management of all my servers☆42May 7, 2025Updated 9 months ago
- Lists various tools used in hardware hacking.☆33Jan 25, 2026Updated last month
- HackMKV - Generate Malacious Video.MKV To Remotely Hack Computer Via Video Files.☆12Jun 11, 2024Updated last year
- ☆35Feb 3, 2025Updated last year
- Streak keeper and XP farm for Duolingo. Never get demoted again!☆12Feb 12, 2026Updated 2 weeks ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆35Jun 23, 2025Updated 8 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆42Apr 7, 2025Updated 10 months ago
- A curated collection of free or freemium web-based penetration testing and vulnerability analysis tools. These tools assist security prof…☆95Apr 17, 2025Updated 10 months ago
- Secure and performant OCI-image builder for Kubernetes☆12Updated this week
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- This is a collection of RATs for educational purposes☆59Aug 13, 2025Updated 6 months ago
- ☆40Nov 29, 2024Updated last year
- ☆14May 1, 2025Updated 10 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated last week