Skip to content
#

social-engineering-techniques

Here are 8 public repositories matching this topic...

Language: All
Filter by language

In some cases, the greatest weakness in a website’s security system is the people that use it. Social engineering seeks to exploit this weakness. A hacker will convince a website user or administrator to divulge some useful information that helps them exploit the website. There are many forms of social engineering attacks, including: Phishing Us…

  • Updated Jan 7, 2021

Using Arduino to spread malicious code via BadUSB attack. This project involves the setup and construction of a potentially harmful fake external storage device, designed to execute arbitrary code and compromise target devices. For educational and Red Teaming purpose only.

  • Updated Aug 11, 2023

Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.

  • Updated Nov 17, 2024
  • Shell

Improve this page

Add a description, image, and links to the social-engineering-techniques topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the social-engineering-techniques topic, visit your repo's landing page and select "manage topics."

Learn more