A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools help security researchers understand human manipulation tactics and improve defense mechanisms.
☆60Jan 25, 2026Updated 3 months ago
Alternatives and similar repositories for Social-Engineering-Tools
Users that are interested in Social-Engineering-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 3 months ago
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆54Jan 25, 2026Updated 3 months ago
- This tool combines the power of Ollama (Mistral) with your terminal to turn natural language into real shell commands. Whether you want t…☆25Jan 25, 2026Updated 3 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆90Jan 25, 2026Updated 3 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆71Jan 25, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 3 months ago
- ☆24Nov 22, 2025Updated 5 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 5 months ago
- Analyze Android native `.so` files☆122Jul 28, 2025Updated 9 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 5 months ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆49Apr 7, 2025Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆38Feb 11, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated last month
- Chrome Extensions for OSINT☆189Mar 6, 2026Updated last month
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 3 months ago
- ☆249Mar 13, 2025Updated last year
- 100 Hacking Tools and Resources☆109Jun 27, 2023Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- WebAnalyzer is a versatile tool for comprehensive domain analysis. It provides insights into WHOIS data, DNS records, subdomains, SEO, we…☆16Apr 6, 2026Updated 3 weeks ago
- A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux a…☆1,363Mar 9, 2026Updated last month
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc☆102Mar 5, 2025Updated last year
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 3 months ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆69Nov 20, 2025Updated 5 months ago
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆30Dec 5, 2025Updated 4 months ago
- Automated pentest report writing and generation using DOCX templates and markdown.☆26Apr 1, 2025Updated last year
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆35Apr 14, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆44Aug 12, 2025Updated 8 months ago
- ☆25Apr 29, 2025Updated last year
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- CVE-2025-1974☆90Apr 2, 2025Updated last year
- ☆11Oct 11, 2020Updated 5 years ago
- Open Source framework for anyone to work with Perplexity Sonar☆67Apr 6, 2025Updated last year