yogsec / Social-Engineering-TacticsLinks
Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware and stay secure!
☆42Updated 6 months ago
Alternatives and similar repositories for Social-Engineering-Tactics
Users that are interested in Social-Engineering-Tactics are comparing it to the libraries listed below
Sorting:
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆52Updated 6 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆137Updated last week
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆97Updated last month
- ☆126Updated 4 months ago
- Chrome Extensions for OSINT☆116Updated 3 months ago
- automated Open Source Intelligence gathering☆133Updated 2 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 10 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆54Updated 9 months ago
- ☆110Updated this week
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆156Updated 6 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆57Updated 2 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆79Updated 6 months ago
- ☆206Updated last week
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated 11 months ago
- A Simple JS code to keylogger data and send it to the personal server☆31Updated 9 months ago
- DPULSE - Tool for complex approach to domain OSINT☆152Updated 2 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆43Updated 6 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆62Updated 2 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆208Updated last month
- Analyze Android native `.so` files☆83Updated 2 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆140Updated 9 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆28Updated 2 weeks ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 2 months ago
- ☆27Updated last year
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆56Updated 2 months ago
- ☆130Updated 4 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- A collection of config files for linux focusing on hackthebox theme☆53Updated this week
- 🕵️ Email osint tool☆62Updated 2 years ago
- ☆94Updated 6 months ago