A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engineering in Cybersecurity
-
Updated
Jan 1, 2022
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engineering in Cybersecurity
Using Arduino to spread malicious code via BadUSB attack. This project involves the setup and construction of a potentially harmful fake external storage device, designed to execute arbitrary code and compromise target devices. For educational and Red Teaming purpose only.
In some cases, the greatest weakness in a website’s security system is the people that use it. Social engineering seeks to exploit this weakness. A hacker will convince a website user or administrator to divulge some useful information that helps them exploit the website. There are many forms of social engineering attacks, including: Phishing Us…
Crafted a spoofed website login page mimicking a legitimate website and designed a phishing email to simulate credential harvesting
Implementation of the BITB attack as a subject of Social Engineering course.
Adversarial Ai Penetration Testing Framework
Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.
A Psychological Mind Hacking Programme!
Bachelor's thesis on the modern threat of AI to Social Engineering
Add a description, image, and links to the social-engineering-techniques topic page so that developers can more easily learn about it.
To associate your repository with the social-engineering-techniques topic, visit your repo's landing page and select "manage topics."