A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools help security researchers understand human manipulation tactics and improve defense mechanisms.
☆62Jan 25, 2026Updated 3 months ago
Alternatives and similar repositories for Social-Engineering-Tools
Users that are interested in Social-Engineering-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆81Jan 25, 2026Updated 3 months ago
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆55Jan 25, 2026Updated 3 months ago
- This tool combines the power of Ollama (Mistral) with your terminal to turn natural language into real shell commands. Whether you want t…☆26Jan 25, 2026Updated 3 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆89Jan 25, 2026Updated 3 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆73Jan 25, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆45Feb 24, 2025Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆36May 8, 2026Updated 2 weeks ago
- Conditional Access Reporting☆29Apr 4, 2025Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 6 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 6 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆40Jun 17, 2025Updated 11 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆50Apr 7, 2025Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆38Feb 11, 2026Updated 3 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Chrome Extensions for OSINT☆195May 5, 2026Updated 2 weeks ago
- A multi-functional toolkit for social engineering, phishing, email spoofing, SMS/OTP bombing, keylogging, and security audits — built for…☆34Mar 11, 2026Updated 2 months ago
- ☆251Mar 13, 2025Updated last year
- Advanced Hunting Queries☆20Mar 18, 2026Updated 2 months ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- 100 Hacking Tools and Resources☆110Jun 27, 2023Updated 2 years ago
- WebAnalyzer is a versatile tool for comprehensive domain analysis. It provides insights into WHOIS data, DNS records, subdomains, SEO, we…☆16Apr 6, 2026Updated last month
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE☆19Apr 17, 2025Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated last year
- A collection of useful lists for Penetration Testing & Bug Bounty - Content Discovery, Payloads, Variables, Sandbox Escaping, etc☆102Mar 5, 2025Updated last year
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It oc…☆17Jan 21, 2023Updated 3 years ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Jan 25, 2026Updated 3 months ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆69Nov 20, 2025Updated 6 months ago
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆31Dec 5, 2025Updated 5 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automated pentest report writing and generation using DOCX templates and markdown.☆26Apr 1, 2025Updated last year
- ☆102Apr 4, 2025Updated last year
- ☆25Apr 29, 2025Updated last year
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 11 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆37Apr 14, 2025Updated last year
- CVE-2025-1974☆90Apr 2, 2025Updated last year