A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engineering in Cybersecurity
-
Updated
Jan 1, 2022
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engineering in Cybersecurity
In some cases, the greatest weakness in a website’s security system is the people that use it. Social engineering seeks to exploit this weakness. A hacker will convince a website user or administrator to divulge some useful information that helps them exploit the website. There are many forms of social engineering attacks, including: Phishing Us…
Using Arduino to spread malicious code via BadUSB attack. This project involves the setup and construction of a potentially harmful fake external storage device, designed to execute arbitrary code and compromise target devices. For educational and Red Teaming purpose only.
Crafted a spoofed website login page mimicking a legitimate website and designed a phishing email to simulate credential harvesting
Implementation of the BITB attack as a subject of Social Engineering course.
Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.
A Psychological Mind Hacking Programme!
Bachelor's thesis on the modern threat of AI to Social Engineering
Add a description, image, and links to the social-engineering-techniques topic page so that developers can more easily learn about it.
To associate your repository with the social-engineering-techniques topic, visit your repo's landing page and select "manage topics."