18 skills found
tnt-wolve / Ch3r0Hackingtool Menu 🧰 AnonSurf Information Gathering Password Attack Wireless Attack SQL Injection Tools Phishing Attack Web Attack Tool Post exploitation Forensic Tools Payload Creator Router Exploit Wifi Jamming XSS Attack Tool Reverse Engineering SocialMedia Finder DDos Attack Tools Steganography Tools IDN Homograph Attack Hash Cracking Tools SocialMedia Attack Android Hack RAT Tools Web Crawling Payload Injector Update System AnonSurf Anonmously Surf Multitor Information Gathering Nmap Dracnmap Port Scanning Host To IP Xerosploit Infoga - Email OSINT ReconSpider RED HAWK (All In One Scanning) ReconDog Striker SecretFinder Port Scanner Breacher Password Attack Cupp WordlistCreator Goblin WordGenerator Credential reuse attacks Wordlist (Contain 1.4 Billion Pass) Wireless Attack WiFi-Pumpkin pixiewps Bluetooth Honeypot GUI Framework Fluxion Wifiphisher Wifite EvilTwin SQL Injection Tools sqlmap tool NoSqlMap Damn Small SQLi Scanner Explo Blisqy - Exploit Time-based blind-SQL injection Leviathan - Wide Range Mass Audit Toolkit SQLScan SocialMedia Attack Instagram Attack AllinOne SocialMedia Attack Facebook Attack Application Checker Android Attack Keydroid MySMS Lockphish (Grab target LOCK PIN) DroidCam (Capture Image) EvilApp (Hijack Session) Phishing Attack Setoolkit SocialFish HiddenEye Evilginx2 Shellphish BlackEye I-See-You(Get Location using phishing attack) SayCheese (Grab target's Webcam Shots) QR Code Jacking Web Attack SlowLoris Skipfish SubDomain Finder CheckURL Blazy Sub-Domain TakeOver Post Explotation Vegile - Ghost In The Shell Chrome Keylogger Forensic Tool Bulk_extractor Disk Clone and ISO Image Aquire AutoSpy Toolsley Wireshark Payload Generator The FatRat* Brutal Stitch MSFvenom Payload Creator Venom Shellcode Generator Spycam Mob-Droid Exploit Framework RouterSploit WebSploit Commix Web2Attack Fastssh SocialMedia Finder Find SocialMedia By Facial Recognation System Find SocialMedia By UserName Sherlock SocialScan Steganography SteganoHide StegnoCracker Whitespace Ddos Attack tool SlowLoris SYN Flood DDoS Weapon UFOnet GoldenEye XSS Attack tool DalFox(Finder of XSS) XSS Payload Generator Advanced XSS Detection Suite Extended XSS Searcher and Finder XSS-Freak XSpear XSSCon XanXSS IDN Homograph EvilURL Email Verifier KnockMail Hash Cracking Tool Hash Buster
De3vil / SteaLinGThe SteaLinG is an open-source penetration testing framework designed for social engineering
mwsrc / SEToolkit ModSocial Engineering Toolkit
AnonHackerr / SetoolkitinstallerThe Social-Engineer Toolkit (SET) automatic installer for Android
Hax4us / SetoolkitNo description available
Bouquets-ai / Setoolkit CN对social-engineer-toolkit项目的核心功能(社工、鱼叉、钓鱼)进行汉化(非机翻),能力有限错误之处还请指出(*^▽^*)Setoolkit_CN汉化
Techzindia / Setoolkit For TermuxNo description available
ayoub-elbouzi / SETOOLKITThe Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element.
sergioab7 / PhishboomHerramienta automatizada para enviar correos con phising.
Encrypted-Everest / Top 20 Phishing Tools To Use In 2024 Stay Ahead Of The GamePhishing attacks are one of the most common cyber threats, and the tools used to conduct them have evolved to become more sophisticated. Here’s You should be aware of in 2024. From SEToolkit to PyPhisher, these tools cover a wide range of phishing attack vectors, including social engineering, email phishing, and even QR code hijacking.
Jubei-Mitsuyoshi / Aaa Setoolkitsocial engineering toolkit packaged for debian
boychongzen18 / Setoolkit7.7.2 No RootingNo description available
whysj / Setoolkit By TrustedsecNo description available
Mogito89 / SetoolkitSocial Engineering Tool Kit
wangD-e-v / SetoolkitThe Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element.
mongoishere / Setoolkit RenewedI noticed that a lot of the setoolkit templates were not only outdated but also lacking some of the social networking platforms that are more commonly used today so I added my own templates here.
NerduMiner / P2setoolkitA tool that dissassembles and reassembles sequenced music files from Pikmin 2, specializes in handling Pikmin 2's se.bms file.
Atharvkote / Cyber SecurityThis repository is a comprehensive reference guide for commonly used penetration testing tools. It includes detailed commands, explanations, & practical usage examples for tools such as Nmap for network scanning and firewall evasion, Hydra for brute force attacks on services, JohntheRipper for password and hash cracking, and SEToolkit for phising