social-engineering-attacks
There are 78 repositories under social-engineering-attacks topic.
indradhar/social-engineering-attack-wifi
Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation
jairandresdiazp/TrakingPeople
People tracker on the Internet: Learn to track the world, to avoid being traced.
Flareonz44/WhatsApp-Web-Session-Dumper
Dump WhatsApp Web session data to file, and inject it on multiple computers, without scanning QR again!
chi-0828/Phishing-with-DNS-spoofing
A Phishing website (fack facebook login page) and DNS spoofing demo.
patternex/patternex-feed
PatternEx domain feed: malicious domains detected with AI
dappoo/ShellPhiser
Phising tool
omkar787/SoPhish
An OpenSource Hub where you will find all the popular social media clones.
9ee1/SafeBrowsing.NET
.NET implementation of the Google Safe Browsing API
Yochhelun/YoChi_list
This is a steadily updated list of phishing attack kits designed to retrieve login details along side other personal credentials.
imrahulkant/social-media-checker
Python Program to Check whether the particular email-id is attached to particular Social Media or not.
lynneeai/ConvoSentinel
This is the official repository of the EMNLP 2024 paper: Defending Against Social Engineering Attacks in the Age of LLMs.
Ryanhustler420/__toolbox_kali.exe
Daily Use Tools for Pentester/ Hackers
0xnarwhal/BadUSB
A framework to kickstart yourself in making malicious USB devices using ATTiny85.
Astaruf/BadArduino
Using Arduino to spread malicious code via BadUSB attack. This project involves the setup and construction of a potentially harmful fake external storage device, designed to execute arbitrary code and compromise target devices. For educational and Red Teaming purpose only.
jocephus/social-forensication
These are the Scripts Associated with Joe's Social Forensication presentation
VirusZzHkP/Keylogger
Be the m@st3r of ur Targ3ts PC
wasfyelbaz/WifiStealer
Wifi Stealer steals all the wifi networks profiled on the target's system.
nirosen/Homoglyph_Detection
This is a project which aims to identify Social-Engineering in the domain of digital-forensics & cyber-security. The first approach is to find an abuse of the graphical-similiarity of strings.
ranguli/spooky-sites
Phishing tool for security awareness training
abideenml/Detecting-SocialEngineering-Attacks
Detecting ☎️ Telephone-based Social Engineering Attacks Using Document 📑 Vectorization (Doc2Vec, Universal Vector Encoder), Clustering (K-means, DBSCAN, EM) and Classification of Scam Signatures
carlott0/Steal-windows-credentials
This tool allows you to trick the victim to enter the username and password in a dialog box when the PC is started. These credentials are then saved. It is necessary to use a key or run the code on the victim's PC, both to insert the malware and to extract the credentials.
kaantekiner/sedres
DNSSEC Application in Terms of Cyber Security and Social Engineering: Sedres / Bachelor's Degree Thesis, Yeditepe University - 2021
miladgol/pyshadowlist
Simply create a password list
Fransuelton/cibersecurity-desafio-phishing
Desafio de Projeto do Bootcamp Santander Cibersegurança - Criação de um Phishing com o Kali Linux usando a ferramenta setoolkit.
Shehan-Anuradha/Project-Bytesgate
Bytesgate is a platform that helps people to understand how a social engineering attack happens, how the attackers trick them, and make them fully aware of this attack
trsecu/Social-Engineering-HH
Social engineering is the art of manipulating people into performing
yoramvandevelde/wp-cli_attack_object_cache
Attacking hosting webservers through WP-CLI
juan-jose-vivas/Como-Hacer-Un-Ataque-De-Phishing-Usando-SET
Bien, vamos a explicar como se hace un ataque de phishing usando un correo electrónico fraudulento
Red-Labs-Cloud/Social-Engineering-Labs
Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.
gotonode/thesis
Bachelor's thesis on the modern threat of AI to Social Engineering
HumayunShariarHimu/tracking
A Psychological Mind Hacking Programme!
leviseibert/PhishingGraph
PhishingGraph is a methodology of utilizing machine learning chatbots to identify and analyze phishing threats.
nonskilledeveloper/web-phisher
Simple SET alternative