A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools help security researchers understand human manipulation tactics and improve defense mechanisms.
☆60Jan 25, 2026Updated 2 months ago
Alternatives and similar repositories for Social-Engineering-Tools
Users that are interested in Social-Engineering-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆53Jan 25, 2026Updated 2 months ago
- This tool combines the power of Ollama (Mistral) with your terminal to turn natural language into real shell commands. Whether you want t…☆25Jan 25, 2026Updated 2 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆90Jan 25, 2026Updated 2 months ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆70Jan 25, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- Conditional Access Reporting☆29Apr 4, 2025Updated last year
- ☆23Nov 22, 2025Updated 4 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆40Jun 17, 2025Updated 9 months ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆48Apr 7, 2025Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆38Feb 11, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated 3 weeks ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 2 months ago
- ☆248Mar 13, 2025Updated last year
- 100 Hacking Tools and Resources☆109Jun 27, 2023Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux a…☆1,331Mar 9, 2026Updated last month
- WebAnalyzer is a versatile tool for comprehensive domain analysis. It provides insights into WHOIS data, DNS records, subdomains, SEO, we…☆14Updated this week
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 9 months ago
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆30Dec 5, 2025Updated 4 months ago
- Automated pentest report writing and generation using DOCX templates and markdown.☆26Apr 1, 2025Updated last year
- ☆102Apr 4, 2025Updated last year
- ☆25Apr 29, 2025Updated 11 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆44Aug 12, 2025Updated 8 months ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- CVE-2025-1974☆90Apr 2, 2025Updated last year
- ☆11Oct 11, 2020Updated 5 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year