An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: social-engineering-techniques

NitchayaninT/EGCI477_Pentest

These are the lectures from the Penetration testing course. Go to README to navigate to the topic you're interested in (I used Obsidian)

Size: 2.3 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 1 - Forks: 0

yogsec/Social-Engineering-Tools

A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tools help security researchers understand human manipulation tactics and improve defense mechanisms.

Size: 47.9 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 50 - Forks: 6

yogsec/Social-Engineering-Tactics

Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware and stay secure!

Size: 18.6 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 29 - Forks: 2

paulveillard/cybersecurity-social-engineering

A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engineering in Cybersecurity

Size: 54.7 KB - Last synced at: 2 months ago - Pushed at: over 3 years ago - Stars: 18 - Forks: 1

gotonode/thesis

Bachelor's thesis on the modern threat of AI to Social Engineering

Language: TeX - Size: 6.55 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Astaruf/BadArduino

Using Arduino to spread malicious code via BadUSB attack. This project involves the setup and construction of a potentially harmful fake external storage device, designed to execute arbitrary code and compromise target devices. For educational and Red Teaming purpose only.

Language: C++ - Size: 50 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 5 - Forks: 0

Red-Labs-Cloud/Social-Engineering-Labs

Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.

Language: Shell - Size: 1.14 MB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

HumayunShariarHimu/tracking

A Psychological Mind Hacking Programme!

Language: HTML - Size: 56.6 KB - Last synced at: 3 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

Velomon/ShInject

ShInject is a bash execution and terminal injection mini-toolkit, supporting URLs and Hashcat

Language: Python - Size: 36.1 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

david-pellissier/BITB-Phishing-prototype Fork of arubinst/Teaching-HEIGVD-SEN-2022-Laboratoire-BITB

Implementation of the BITB attack as a subject of Social Engineering course.

Language: HTML - Size: 2.88 MB - Last synced at: almost 2 years ago - Pushed at: about 3 years ago - Stars: 0 - Forks: 0

Aryia-Behroziuan/Social-engineering-techniques

In some cases, the greatest weakness in a website’s security system is the people that use it. Social engineering seeks to exploit this weakness. A hacker will convince a website user or administrator to divulge some useful information that helps them exploit the website. There are many forms of social engineering attacks, including: Phishing Users of a website are sent fraudulent emails that look like they have come from the website. The user is asked to divulge some information, such as their login details or personal information. The hacker can use this information to compromises the website. Baiting This is a classic social engineering technique that was first used in the 1970s. A hacker will leave a device near your place of business, perhaps marked with a label like “employee salaries”. One of your employees might pick it up and insert it into their computer out of curiosity. The USB stick will contain malware that infects your computer networks and compromises your website. Pretexting A hacker will contact you, one of your customers or an employee and pretend to be someone else. They will demand sensitive information, which they use to compromise your website. The best way to eliminate social engineering attacks is to educate your employees and customers about these kinds of attacks.

Size: 1000 Bytes - Last synced at: about 2 years ago - Pushed at: over 4 years ago - Stars: 2 - Forks: 0