A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools help security researchers understand human manipulation tactics and improve defense mechanisms.
☆60Jan 25, 2026Updated last month
Alternatives and similar repositories for Social-Engineering-Tools
Users that are interested in Social-Engineering-Tools are comparing it to the libraries listed below
Sorting:
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆47Jan 25, 2026Updated last month
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆51Jan 25, 2026Updated last month
- This tool combines the power of Ollama (Mistral) with your terminal to turn natural language into real shell commands. Whether you want t…☆21Jan 25, 2026Updated last month
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated last month
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆88Jan 25, 2026Updated last month
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Feb 24, 2025Updated last year
- WebAnalyzer is a versatile tool for comprehensive domain analysis. It provides insights into WHOIS data, DNS records, subdomains, SEO, we…☆13Oct 6, 2025Updated 4 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- Conditional Access Reporting☆29Apr 4, 2025Updated 10 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆61Jan 25, 2026Updated last month
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 weeks ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆36Nov 12, 2025Updated 3 months ago
- This project documents my hands-on journey in learning and conducting internal Active Directory (AD) penetration testing. The exercises s…☆16Apr 19, 2025Updated 10 months ago
- Random Hashcat Scrips☆36Oct 12, 2024Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆37Feb 11, 2026Updated 2 weeks ago
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆30Dec 5, 2025Updated 2 months ago
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated 10 months ago
- Advanced Hunting Queries☆20Updated this week
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆42Apr 7, 2025Updated 10 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆35Jun 23, 2025Updated 8 months ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 5 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux a…☆1,195Jan 25, 2026Updated last month
- ☆19Nov 28, 2024Updated last year
- Chrome Extensions for OSINT☆176Oct 29, 2025Updated 4 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- Here Are Some Popular Hacking PDF☆644Oct 29, 2025Updated 4 months ago
- It automates the generation of search queries to discover exposed resources such as sensitive files, admin panels, open directories, and …☆76Feb 23, 2026Updated last week
- CVE-2025-1974☆90Apr 2, 2025Updated 11 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Oct 14, 2024Updated last year
- Complete Malware Index - Use at your own Risk!☆20Sep 2, 2024Updated last year
- easy open http, tcp ports from localhost to internet.☆27Nov 16, 2025Updated 3 months ago
- ☆20Nov 28, 2022Updated 3 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Telegram video (mp4) extension manipulation PoC☆96Mar 4, 2025Updated 11 months ago
- 𝗖𝗼𝗺𝗽𝗹𝗲𝘁𝗲 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗥𝗼𝗮𝗱𝗺𝗮𝗽 🎯☆97Dec 29, 2025Updated 2 months ago
- ☆145Jun 9, 2025Updated 8 months ago
- Re-Malwack ad block-maxxing magisk module | protect your device from ads, malware, p*rn, gambling sites, fake news sites, And more !☆28Nov 19, 2025Updated 3 months ago