Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware and stay secure!
☆46Jan 25, 2026Updated 3 months ago
Alternatives and similar repositories for Social-Engineering-Tactics
Users that are interested in Social-Engineering-Tactics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated 3 months ago
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆54Jan 25, 2026Updated 3 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 3 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆90Jan 25, 2026Updated 3 months ago
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆239Jan 25, 2026Updated 3 months ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 10 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆18Mar 14, 2025Updated last year
- A simple reverse and as well a webshell that recognices the OS (Windows/Linux).☆18Nov 11, 2020Updated 5 years ago
- A curated list of awesome Web3 Security.☆28Aug 5, 2025Updated 9 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆60Jan 25, 2026Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆100Apr 2, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- Go bindings for naiveproxy.☆32Updated this week
- Lists various tools used in hardware hacking.☆34Jan 25, 2026Updated 3 months ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- High-performance reverse proxy that forwards the client TLS (JA4), HTTP/2 (Akamai) and TCP SYN (p0f via eBPF/XDP) signatures as headers t…☆38Updated this week
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 8 months ago
- RF front end for a software defined receiver☆12May 31, 2025Updated 11 months ago
- Network Security Config patcher for Android applications (APKs)☆13Sep 4, 2021Updated 4 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆49Apr 7, 2025Updated last year
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆28Mar 31, 2025Updated last year
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- ☆13Sep 23, 2024Updated last year
- Reverse engineered Amazon antibot system called AWSWAF. This also includes a FASTAPI to use it as an API. Used on sites like binance, hug…☆52Mar 14, 2026Updated last month
- Helping navigate through maps to prefer road-way.☆11Apr 6, 2022Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Apr 2, 2026Updated last month
- RevEng.AI Radare2 Plugin☆17Jul 13, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated 3 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 10 months ago
- A bytecode-engineering library for python 3.11☆11Jan 17, 2023Updated 3 years ago
- Load your data into burp☆11Apr 26, 2023Updated 3 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Monitoring a high precision 10MHz GPS disciplined oscillator (GPSDO)☆14Dec 1, 2024Updated last year
- 免费的指纹浏览器,Mask the most advanced open-source browser fingerprinting library,专门定制的141版本chromium指纹浏览器用来过FingerPrintJS和其pro付费版本,支持HTTP密码代理☆35Dec 18, 2025Updated 4 months ago