Archive | Social Engineering




SPF (SpeedPhish Framework) – E-mail Phishing Toolkit

SPF (SpeedPhish Framework) is a an e-mail phishing toolkit written in Python designed to allow for quick recon and deployment of simple social engineering phishing exercises. There are also other popular Phishing tools are frameworks such as: – Phishing Frenzy – E-mail Phishing Framework – Gophish – Open-Source Phishing Framework – sptoolkit Rebirth – Simple […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Phishing, Social Engineering | Add a Comment

Phishing Frenzy – E-mail Phishing Framework

Phishing Frenzy is an Open Source Ruby on Rails e-mail phishing framework designed to help penetration testers manage multiple, complex phishing campaigns. The goal of the project is to streamline the phishing process while still providing clients the best realistic phishing campaign possible. This goal is obtainable through campaign management, template reuse, statistical generation, and […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Phishing, Social Engineering | Add a Comment

FSFlow – A Social Engineering Call Flow Application

FSFlow is a Social Engineering Call Flow Application, which was created to improve and standardize social engineering calls. It’s a difficult thing to do, conversations can go almost anywhere over the span of a phone call which makes defining a specific process hard, if not impossible. FSFlow is mostly a proof of concept tool but […]

Tags: , , , , , ,

Posted in: Social Engineering | Add a Comment

Source Code Hosting Service Code Spaces Deleted By Hacker

There’s been a LOT of noise about this incident in the past day or two, the very definition of a cloud nightmare. Git/SVN & Project Management SaaS Code Spaces has been hacked and completely deleted by a hacker. It started off with a large scale DDoS attack (the likes of which Feedly and Evernote have […]

Tags: , , , , , , , , , ,

Posted in: Password Cracking, Social Engineering | Add a Comment

A Story Of Social Engineering – How @N Lost His $50,000 Twitter Handle

So last week I read an interesting tale about social engineering on Medium, a story by a chap named Naoki Hiroshima and his Twitter handle, which was @N. Yes just one letter, a pretty rare and it seems valuable handle as he had offers of up to $50,000 for it. In the end though, someone […]

Tags: , , , , , , , , , ,

Posted in: Social Engineering | Add a Comment

FoxOne Free OSINT Tool – Server Reconnaissance Scanner

FoxOne is a free OSINT tool, described by the author (th3j35t3r) as a Non-Invasive and Non-Detectable Server Reconnaissance Scanner. Bypassing API limitations and currently detecting 6500+ vulnerable server paths/files – without ever touching the target server. Very good for getting hold of intel on a given domain (example.com). The intel gained serves both as actionable […]

Tags: , , , , , , , ,

Posted in: Privacy, Security Software, Social Engineering | Add a Comment

Hacker On Hacker Action – Zeus Botmaster Targets Anonymous Supporters

It somehow reminds me of the oldskool game Spy vs Spy, anyone remember that? Anyhow, that’s off-topic right now. The news is, some smart malware pimp managed to dupe a whole bunch of Anonymous supporters into installing the Zeus botnet – when they thought they were getting a DDoS tool. It’s a pretty big base […]

Tags: , , , , , , , , , , ,

Posted in: Malware, Social Engineering | Add a Comment

VeriSign Demands The Power To Take Down Websites/Domains

I was scanning the news today, and nothing much was going on. There were some half-arsed stories about Anonymous and LulzSec – but nothing really worth writing about. And then, and then I spotted this, which quite frankly scares the shit out of me. As much as it may well have a use in law […]

Tags: , , , , , ,

Posted in: Legal Issues, Social Engineering, Web Hacking | Add a Comment

The Social-Engineer Toolkit (SET) – Computer Based Social Engineering Tools

The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has […]

Tags: , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Social Engineering | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·