A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engineering in Cybersecurity
-
Updated
Jan 1, 2022
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engineering in Cybersecurity
In some cases, the greatest weakness in a website’s security system is the people that use it. Social engineering seeks to exploit this weakness. A hacker will convince a website user or administrator to divulge some useful information that helps them exploit the website. There are many forms of social engineering attacks, including: Phishing Us…
Penetration testing concepts, steps, tools, and how to write a pentest report
The Cyber Security Awareness Training Game is an interactive desktop application designed to educate users about cybersecurity threats through a gamified experience.
Crafted a spoofed website login page mimicking a legitimate website and designed a phishing email to simulate credential harvesting
Implementation of the BITB attack as a subject of Social Engineering course.
This repository contains a mock e-commerce site created for educational purposes only. Its designed for phishing the Credit Cards..
hackherway cyberepo || Learn how to HackHerWay - The Hacker Way
Bachelor's thesis on the modern threat of AI to Social Engineering
Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.
A Psychological Mind Hacking Programme!
Add a description, image, and links to the social-engineering-techniques topic page so that developers can more easily learn about it.
To associate your repository with the social-engineering-techniques topic, visit your repo's landing page and select "manage topics."