mirror of
https://github.com/giuliacassara/awesome-social-engineering.git
synced 2025-01-13 16:19:41 -05:00
Added HTML export for testing purposes
This commit is contained in:
parent
6cb54a0741
commit
4805b8aedd
531
README.html
Normal file
531
README.html
Normal file
@ -0,0 +1,531 @@
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
|
||||
<head>
|
||||
|
||||
<meta charset="utf-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=yes">
|
||||
<title>README</title>
|
||||
|
||||
|
||||
<style type="text/css">
|
||||
body {
|
||||
font-family: Helvetica, arial, sans-serif;
|
||||
font-size: 14px;
|
||||
line-height: 1.6;
|
||||
padding-top: 10px;
|
||||
padding-bottom: 10px;
|
||||
background-color: white;
|
||||
padding: 30px; }
|
||||
|
||||
body > *:first-child {
|
||||
margin-top: 0 !important; }
|
||||
body > *:last-child {
|
||||
margin-bottom: 0 !important; }
|
||||
|
||||
a {
|
||||
color: #4183C4; }
|
||||
a.absent {
|
||||
color: #cc0000; }
|
||||
a.anchor {
|
||||
display: block;
|
||||
padding-left: 30px;
|
||||
margin-left: -30px;
|
||||
cursor: pointer;
|
||||
position: absolute;
|
||||
top: 0;
|
||||
left: 0;
|
||||
bottom: 0; }
|
||||
|
||||
h1, h2, h3, h4, h5, h6 {
|
||||
margin: 20px 0 10px;
|
||||
padding: 0;
|
||||
font-weight: bold;
|
||||
-webkit-font-smoothing: antialiased;
|
||||
cursor: text;
|
||||
position: relative; }
|
||||
|
||||
h1:hover a.anchor, h2:hover a.anchor, h3:hover a.anchor, h4:hover a.anchor, h5:hover a.anchor, h6:hover a.anchor {
|
||||
background: url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAA09pVFh0WE1MOmNvbS5hZG9iZS54bXAAAAAAADw/eHBhY2tldCBiZWdpbj0i77u/IiBpZD0iVzVNME1wQ2VoaUh6cmVTek5UY3prYzlkIj8+IDx4OnhtcG1ldGEgeG1sbnM6eD0iYWRvYmU6bnM6bWV0YS8iIHg6eG1wdGs9IkFkb2JlIFhNUCBDb3JlIDUuMy1jMDExIDY2LjE0NTY2MSwgMjAxMi8wMi8wNi0xNDo1NjoyNyAgICAgICAgIj4gPHJkZjpSREYgeG1sbnM6cmRmPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5LzAyLzIyLXJkZi1zeW50YXgtbnMjIj4gPHJkZjpEZXNjcmlwdGlvbiByZGY6YWJvdXQ9IiIgeG1sbnM6eG1wPSJodHRwOi8vbnMuYWRvYmUuY29tL3hhcC8xLjAvIiB4bWxuczp4bXBNTT0iaHR0cDovL25zLmFkb2JlLmNvbS94YXAvMS4wL21tLyIgeG1sbnM6c3RSZWY9Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC9zVHlwZS9SZXNvdXJjZVJlZiMiIHhtcDpDcmVhdG9yVG9vbD0iQWRvYmUgUGhvdG9zaG9wIENTNiAoMTMuMCAyMDEyMDMwNS5tLjQxNSAyMDEyLzAzLzA1OjIxOjAwOjAwKSAgKE1hY2ludG9zaCkiIHhtcE1NOkluc3RhbmNlSUQ9InhtcC5paWQ6OUM2NjlDQjI4ODBGMTFFMTg1ODlEODNERDJBRjUwQTQiIHhtcE1NOkRvY3VtZW50SUQ9InhtcC5kaWQ6OUM2NjlDQjM4ODBGMTFFMTg1ODlEODNERDJBRjUwQTQiPiA8eG1wTU06RGVyaXZlZEZyb20gc3RSZWY6aW5zdGFuY2VJRD0ieG1wLmlpZDo5QzY2OUNCMDg4MEYxMUUxODU4OUQ4M0REMkFGNTBBNCIgc3RSZWY6ZG9jdW1lbnRJRD0ieG1wLmRpZDo5QzY2OUNCMTg4MEYxMUUxODU4OUQ4M0REMkFGNTBBNCIvPiA8L3JkZjpEZXNjcmlwdGlvbj4gPC9yZGY6UkRGPiA8L3g6eG1wbWV0YT4gPD94cGFja2V0IGVuZD0iciI/PsQhXeAAAABfSURBVHjaYvz//z8DJYCRUgMYQAbAMBQIAvEqkBQWXI6sHqwHiwG70TTBxGaiWwjCTGgOUgJiF1J8wMRAIUA34B4Q76HUBelAfJYSA0CuMIEaRP8wGIkGMA54bgQIMACAmkXJi0hKJQAAAABJRU5ErkJggg==) no-repeat 10px center;
|
||||
text-decoration: none; }
|
||||
|
||||
h1 tt, h1 code {
|
||||
font-size: inherit; }
|
||||
|
||||
h2 tt, h2 code {
|
||||
font-size: inherit; }
|
||||
|
||||
h3 tt, h3 code {
|
||||
font-size: inherit; }
|
||||
|
||||
h4 tt, h4 code {
|
||||
font-size: inherit; }
|
||||
|
||||
h5 tt, h5 code {
|
||||
font-size: inherit; }
|
||||
|
||||
h6 tt, h6 code {
|
||||
font-size: inherit; }
|
||||
|
||||
h1 {
|
||||
font-size: 28px;
|
||||
color: black; }
|
||||
|
||||
h2 {
|
||||
font-size: 24px;
|
||||
border-bottom: 1px solid #cccccc;
|
||||
color: black; }
|
||||
|
||||
h3 {
|
||||
font-size: 18px; }
|
||||
|
||||
h4 {
|
||||
font-size: 16px; }
|
||||
|
||||
h5 {
|
||||
font-size: 14px; }
|
||||
|
||||
h6 {
|
||||
color: #777777;
|
||||
font-size: 14px; }
|
||||
|
||||
p, blockquote, ul, ol, dl, li, table, pre {
|
||||
margin: 15px 0; }
|
||||
|
||||
hr {
|
||||
background: transparent url(data:image/png;base64,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) repeat-x 0 0;
|
||||
border: 0 none;
|
||||
color: #cccccc;
|
||||
height: 4px;
|
||||
padding: 0;
|
||||
}
|
||||
|
||||
body > h2:first-child {
|
||||
margin-top: 0;
|
||||
padding-top: 0; }
|
||||
body > h1:first-child {
|
||||
margin-top: 0;
|
||||
padding-top: 0; }
|
||||
body > h1:first-child + h2 {
|
||||
margin-top: 0;
|
||||
padding-top: 0; }
|
||||
body > h3:first-child, body > h4:first-child, body > h5:first-child, body > h6:first-child {
|
||||
margin-top: 0;
|
||||
padding-top: 0; }
|
||||
|
||||
a:first-child h1, a:first-child h2, a:first-child h3, a:first-child h4, a:first-child h5, a:first-child h6 {
|
||||
margin-top: 0;
|
||||
padding-top: 0; }
|
||||
|
||||
h1 p, h2 p, h3 p, h4 p, h5 p, h6 p {
|
||||
margin-top: 0; }
|
||||
|
||||
li p.first {
|
||||
display: inline-block; }
|
||||
li {
|
||||
margin: 0; }
|
||||
ul, ol {
|
||||
padding-left: 30px; }
|
||||
|
||||
ul :first-child, ol :first-child {
|
||||
margin-top: 0; }
|
||||
|
||||
dl {
|
||||
padding: 0; }
|
||||
dl dt {
|
||||
font-size: 14px;
|
||||
font-weight: bold;
|
||||
font-style: italic;
|
||||
padding: 0;
|
||||
margin: 15px 0 5px; }
|
||||
dl dt:first-child {
|
||||
padding: 0; }
|
||||
dl dt > :first-child {
|
||||
margin-top: 0; }
|
||||
dl dt > :last-child {
|
||||
margin-bottom: 0; }
|
||||
dl dd {
|
||||
margin: 0 0 15px;
|
||||
padding: 0 15px; }
|
||||
dl dd > :first-child {
|
||||
margin-top: 0; }
|
||||
dl dd > :last-child {
|
||||
margin-bottom: 0; }
|
||||
|
||||
blockquote {
|
||||
border-left: 4px solid #dddddd;
|
||||
padding: 0 15px;
|
||||
color: #777777; }
|
||||
blockquote > :first-child {
|
||||
margin-top: 0; }
|
||||
blockquote > :last-child {
|
||||
margin-bottom: 0; }
|
||||
|
||||
table {
|
||||
padding: 0;border-collapse: collapse; }
|
||||
table tr {
|
||||
border-top: 1px solid #cccccc;
|
||||
background-color: white;
|
||||
margin: 0;
|
||||
padding: 0; }
|
||||
table tr:nth-child(2n) {
|
||||
background-color: #f8f8f8; }
|
||||
table tr th {
|
||||
font-weight: bold;
|
||||
border: 1px solid #cccccc;
|
||||
margin: 0;
|
||||
padding: 6px 13px; }
|
||||
table tr td {
|
||||
border: 1px solid #cccccc;
|
||||
margin: 0;
|
||||
padding: 6px 13px; }
|
||||
table tr th :first-child, table tr td :first-child {
|
||||
margin-top: 0; }
|
||||
table tr th :last-child, table tr td :last-child {
|
||||
margin-bottom: 0; }
|
||||
|
||||
img {
|
||||
max-width: 100%; }
|
||||
|
||||
span.frame {
|
||||
display: block;
|
||||
overflow: hidden; }
|
||||
span.frame > span {
|
||||
border: 1px solid #dddddd;
|
||||
display: block;
|
||||
float: left;
|
||||
overflow: hidden;
|
||||
margin: 13px 0 0;
|
||||
padding: 7px;
|
||||
width: auto; }
|
||||
span.frame span img {
|
||||
display: block;
|
||||
float: left; }
|
||||
span.frame span span {
|
||||
clear: both;
|
||||
color: #333333;
|
||||
display: block;
|
||||
padding: 5px 0 0; }
|
||||
span.align-center {
|
||||
display: block;
|
||||
overflow: hidden;
|
||||
clear: both; }
|
||||
span.align-center > span {
|
||||
display: block;
|
||||
overflow: hidden;
|
||||
margin: 13px auto 0;
|
||||
text-align: center; }
|
||||
span.align-center span img {
|
||||
margin: 0 auto;
|
||||
text-align: center; }
|
||||
span.align-right {
|
||||
display: block;
|
||||
overflow: hidden;
|
||||
clear: both; }
|
||||
span.align-right > span {
|
||||
display: block;
|
||||
overflow: hidden;
|
||||
margin: 13px 0 0;
|
||||
text-align: right; }
|
||||
span.align-right span img {
|
||||
margin: 0;
|
||||
text-align: right; }
|
||||
span.float-left {
|
||||
display: block;
|
||||
margin-right: 13px;
|
||||
overflow: hidden;
|
||||
float: left; }
|
||||
span.float-left span {
|
||||
margin: 13px 0 0; }
|
||||
span.float-right {
|
||||
display: block;
|
||||
margin-left: 13px;
|
||||
overflow: hidden;
|
||||
float: right; }
|
||||
span.float-right > span {
|
||||
display: block;
|
||||
overflow: hidden;
|
||||
margin: 13px auto 0;
|
||||
text-align: right; }
|
||||
|
||||
code, tt {
|
||||
margin: 0 2px;
|
||||
padding: 0 5px;
|
||||
white-space: nowrap;
|
||||
border: 1px solid #eaeaea;
|
||||
background-color: #f8f8f8;
|
||||
border-radius: 3px; }
|
||||
|
||||
pre code {
|
||||
margin: 0;
|
||||
padding: 0;
|
||||
white-space: pre;
|
||||
border: none;
|
||||
background: transparent; }
|
||||
|
||||
.highlight pre {
|
||||
background-color: #f8f8f8;
|
||||
border: 1px solid #cccccc;
|
||||
font-size: 13px;
|
||||
line-height: 19px;
|
||||
overflow: auto;
|
||||
padding: 6px 10px;
|
||||
border-radius: 3px; }
|
||||
|
||||
pre {
|
||||
background-color: #f8f8f8;
|
||||
border: 1px solid #cccccc;
|
||||
font-size: 13px;
|
||||
line-height: 19px;
|
||||
overflow: auto;
|
||||
padding: 6px 10px;
|
||||
border-radius: 3px; }
|
||||
pre code, pre tt {
|
||||
background-color: transparent;
|
||||
border: none; }
|
||||
|
||||
sup {
|
||||
font-size: 0.83em;
|
||||
vertical-align: super;
|
||||
line-height: 0;
|
||||
}
|
||||
|
||||
kbd {
|
||||
display: inline-block;
|
||||
padding: 3px 5px;
|
||||
font-size: 11px;
|
||||
line-height: 10px;
|
||||
color: #555;
|
||||
vertical-align: middle;
|
||||
background-color: #fcfcfc;
|
||||
border: solid 1px #ccc;
|
||||
border-bottom-color: #bbb;
|
||||
border-radius: 3px;
|
||||
box-shadow: inset 0 -1px 0 #bbb
|
||||
}
|
||||
|
||||
* {
|
||||
-webkit-print-color-adjust: exact;
|
||||
}
|
||||
@media screen and (min-width: 914px) {
|
||||
body {
|
||||
width: 854px;
|
||||
margin:0 auto;
|
||||
}
|
||||
}
|
||||
@media print {
|
||||
table, pre {
|
||||
page-break-inside: avoid;
|
||||
}
|
||||
pre {
|
||||
word-wrap: break-word;
|
||||
}
|
||||
}
|
||||
</style>
|
||||
|
||||
|
||||
</head>
|
||||
|
||||
<body>
|
||||
|
||||
<h1 id="toc_0">Awesome Social Engineering</h1>
|
||||
|
||||
<p><a href="https://github.com/sindresorhus/awesome"><img src="https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg" alt="Awesome"></a>
|
||||
<p align="center">
|
||||
<img id="awesome-social-engineering" src="images/social_engineering.jpg">
|
||||
</p></p>
|
||||
|
||||
<p>A curated list of awesome social engineering resources, inspired by the awesome-* trend on GitHub.</p>
|
||||
|
||||
<p>Those resources and tools are intended only for cybersecurity professional, penetration testers and educational use in a controlled environment.</p>
|
||||
|
||||
<p><strong>No humans were manipulated to make this list!</strong></p>
|
||||
|
||||
<h1 id="toc_1">Table of Contents</h1>
|
||||
|
||||
<ol>
|
||||
<li><a href="#online-courses">Online Courses</a></li>
|
||||
<li><a href="#capture-the-flag">Capture the Flag</a></li>
|
||||
<li><a href="#psychology-books">Psychology Books</a></li>
|
||||
<li><a href="#books">Books</a></li>
|
||||
<li><a href="#osint">OSINT</a></li>
|
||||
<li><a href="#documentation">Documentation</a></li>
|
||||
<li><a href="#tools">Tools</a></li>
|
||||
<li><a href="#miscellaneous">Miscellaneus</a></li>
|
||||
<li><a href="#contribution">Contribution</a></li>
|
||||
<li><a href="#license">License</a></li>
|
||||
</ol>
|
||||
|
||||
<h1 id="toc_2">Online Courses</h1>
|
||||
|
||||
<ul>
|
||||
<li><p><a href="https://www.social-engineer.com/social-engineering-training/">Social-Engineer.com - Social Engineering Training</a></p></li>
|
||||
<li><p><a href="https://inteltechniques.com/online.aspx">IntelTechniques.com - Online OSINT Training Course</a></p></li>
|
||||
<li><p><a href="https://www.udemy.com/learn-social-engineering-from-scratch">Udemy - Learn Social Engineering from Scratch</a></p></li>
|
||||
<li><p><a href="https://www.packtpub.com/application-development/learn-social-engineering-scratch-video">PacktPub - Learn Social Engineering From Scratch by Zaid Sabih</a></p></li>
|
||||
<li><p><a href="https://www.cybrary.it/course/social-engineering/">Cybrary - Social Engineering and Manipulation</a> - Free Course</p></li>
|
||||
</ul>
|
||||
|
||||
<h1 id="toc_3">Capture the Flag</h1>
|
||||
|
||||
<h4 id="toc_4">Social-Engineer.com - The SECTF, DEFCON</h4>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://www.social-engineer.org/sevillage-def-con/the-sectf/">Social-Engineer.com - DEFCON SECTF</a></li>
|
||||
</ul>
|
||||
|
||||
<h1 id="toc_5">Psychology Books</h1>
|
||||
|
||||
<p>Most of these books covers the basics of psychology useful for a social engineer.</p>
|
||||
|
||||
<ul>
|
||||
<li><p><a href="https://www.amazon.co.uk/d/Books/How-Win-Friends-Influence-People-Dale-Carnegie/0091906814/ref=sr_1_1?ie=UTF8&qid=1494621059&sr=8-1&keywords=how+to+win+friends+and+influence+people">How to Win Friends and Influence People - Dale Carnegie</a></p></li>
|
||||
<li><p><a href="https://www.amazon.co.uk/d/Books/48-Laws-Power-Robert-Greene-Collection/1861972784/ref=sr_1_1?ie=UTF8&qid=1494621512&sr=8-1&keywords=the+48+laws+of+power">The 48 Laws of Power - Robert Greene</a></p></li>
|
||||
<li><p><a href="https://www.amazon.co.uk/d/Books/Psychology-Book-Nigel-Benson/1405391243/ref=sr_1_1?ie=UTF8&qid=1494621589&sr=8-1&keywords=psychology">The Psychology Book</a></p></li>
|
||||
<li><p><a href="https://www.amazon.co.uk/Power-Habit-Why-What-Change/dp/1847946240/ref=sr_1_1?ie=UTF8&qid=1494621842&sr=8-1&keywords=the+power+of+habit">The Power of Habit: Why We Do What We Do, and How to Change - Charles Duhigg</a></p></li>
|
||||
<li><p><a href="https://www.amazon.co.uk/d/cka/Influence-Psychology-Persuasion-Robert-B-PhD-Cialdini/006124189X/ref=sr_1_1?ie=UTF8&qid=1494621912&sr=8-1&keywords=influence">Influence: The Psychology of Persuasion Paperback – Robert B., PhD Cialdini</a></p></li>
|
||||
<li><p><a href="https://www.amazon.co.uk/Emotions-Revealed-Understanding-Faces-Feelings/dp/0753817659/ref=sr_1_1?ie=UTF8&qid=1494622003&sr=8-1&keywords=paul+ekman">Emotions Revealed: Understanding Faces and Feelings - Prof Paul Ekman</a></p></li>
|
||||
<li><p><a href="https://www.amazon.co.uk/Psychology-Interrogations-Confessions-Handbook-Policing-x/dp/0470844612/ref=sr_1_1?s=books&ie=UTF8&qid=1494624501&sr=1-1&keywords=psychology+of+interrogation">The Psychology of Interrogations and Confessions: A Handbook - Gisli H. Gudjonsson</a></p></li>
|
||||
<li><p><a href="https://www.goodreads.com/book/show/4049997-mindfucking">Mindfucking: A Critique of Mental Manipulation - Colin McGinn</a></p></li>
|
||||
<li><p><a href="https://www.goodreads.com/book/show/1173576.What_Every_Body_is_Saying">What Every Body is Saying: An Ex-FBI Agent's Guide to Speed-Reading People - Joe Navarro, Marvin Karlins</a></p></li>
|
||||
</ul>
|
||||
|
||||
<h1 id="toc_6">Books</h1>
|
||||
|
||||
<ul>
|
||||
<li><p><a href="https://www.amazon.co.uk/Social-Engineering-Art-Human-Hacking/dp/0470639539/ref=sr_1_1?ie=UTF8&qid=1494622911&sr=8-1&keywords=chris+hadnagy">Social Engineering: The Art of Human Hacking - Chris Hadnagy</a></p></li>
|
||||
<li><p><a href="https://www.amazon.com/gp/product/111943338X/ref=dbs_a_def_rwt_bibl_vppi_i0">Social Engineering: The Science of Human Hacking</a></p></li>
|
||||
<li><p><a href="https://www.amazon.com/Unmasking-Social-Engineer-Element-Security/dp/1118608577">Unmasking the Social Engineer: The Human Element of Security - Christopher Hadnagy, Dr. Ekman Paul</a></p></li>
|
||||
<li><p><a href="https://www.amazon.co.uk/Phishing-Dark-Waters-Offensive-Defensive-x/dp/1118958470/ref=sr_1_fkmr0_1?ie=UTF8&qid=1494622911&sr=8-1-fkmr0&keywords=chris+hadnagy">Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails - Christopher Hadnagy, Michele Fincher, Robin Dreeke </a></p></li>
|
||||
<li><p><a href="https://www.amazon.com/Social-Engineering-Security-Techniques-Networking/dp/0071818464">Social Engineering in IT Security: Tools, Tactics, and Techniques, Sharon Conheady</a></p></li>
|
||||
<li><p><a href="https://www.amazon.co.uk/No-Tech-Hacking-Engineering-Dumpster/dp/1597492159/ref=sr_1_1?ie=UTF8&qid=1494624109&sr=8-1&keywords=no+tech+hacking">No Tech Hacking - Johnny Long, Kevin D. Mitnick</a></p></li>
|
||||
<li><p><a href="https://www.amazon.it/Low-Tech-Hacking-Security-Professionals/dp/1597496650">Low Tech Hacking: Street Smarts for Security Professionals - Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers</a></p></li>
|
||||
<li><p><a href="https://www.amazon.co.uk/Art-Deception-Controlling-Element-Security/dp/076454280X/ref=pd_sim_14_1?_encoding=UTF8&psc=1&refRID=37KD2B6G2Q981MB8D2GM">The Art of Deception: Controlling the Human Element of Security, Kevin D. Mitnick, William L. Simon</a></p></li>
|
||||
<li><p><a href="https://www.amazon.com/Ghost-Wires-Adventures-Worlds-Wanted/dp/0316037729/ref=sr_1_1?s=books&ie=UTF8&qid=1494769979&sr=1-1&keywords=ghost+in+the+wires">Ghost in the Wires: My Adventures as the World's Most Wanted Hacker - Kevin D. Mitnick, William L. Simon, Steve Wozniak</a></p></li>
|
||||
<li><p><a href="https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother/dp/0316380520/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1494770268&sr=1-1">The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data - Kevin Mitnick, Robert Vamosi</a></p></li>
|
||||
<li><p><a href="https://www.amazon.com/Social-Engineers-Playbook-Practical-Pretexting/dp/0692306617/ref=sr_1_1?s=books&ie=UTF8&qid=1494770673&sr=1-1&keywords=The+Social+Engineer%27s+Playbook%3A+A+Practical+Guide+to+Pretexting">The Social Engineer's Playbook: A Practical Guide to Pretexting - Jeremiah Talamantes</a></p></li>
|
||||
<li><p><a href="https://www.packtpub.com/networking-and-servers/learn-social-engineering">Learn Social Engineering - Erdal Ozkaya</a></p></li>
|
||||
</ul>
|
||||
|
||||
<h1 id="toc_7">OSINT</h1>
|
||||
|
||||
<h4 id="toc_8">OSINT Resources</h4>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://github.com/jivoi/awesome-osint">Awesome OSINT</a> - Awesome list of OSINT</li>
|
||||
<li><a href="http://osintframework.com/">OSINT Framework</a> - Collection of various OSInt tools broken out by category.</li>
|
||||
<li><a href="https://inteltechniques.com/menu.html">Intel Techniques</a> - A collection of OSINT tools. Menu on the left can be used to navigate through the categories.</li>
|
||||
<li><a href="http://netbootcamp.org/osinttools/">NetBootcamp OSINT Tools</a> - A collection of OSINT links and custom Web interfaces to other services such as <a href="http://netbootcamp.org/facebook.html">Facebook Graph Search</a> and <a href="http://netbootcamp.org/pastesearch.html">various paste sites</a>.</li>
|
||||
<li><a href="http://www.automatingosint.com/blog/">Automating OSINT blog</a> - A blog about OSINT curated by Justin Seitz, the same author of BHP.</li>
|
||||
</ul>
|
||||
|
||||
<h4 id="toc_9">OSINT Tools</h4>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://github.com/evilsocket/xray">XRay</a> - XRay is a tool for recon, mapping and OSINT gathering from public networks.</li>
|
||||
<li><a href="https://inteltechniques.com/menu.html">Intel Techniques Online Tools</a> - Use the links to the left to access all of the custom search tools.</li>
|
||||
<li><a href="https://inteltechniques.com/buscador/">Buscador</a> - A Linux Virtual Machine that is pre-configured for online investigators</li>
|
||||
<li><a href="http://www.paterva.com/web7/">Maltego</a> - Proprietary software for open source intelligence and forensics, from Paterva.</li>
|
||||
<li><a href="https://github.com/laramies/theHarvester">theHarvester</a> - E-mail, subdomain and people names harvester</li>
|
||||
<li><a href="https://github.com/ilektrojohn/creepy">creepy</a> - A geolocation OSINT tool</li>
|
||||
<li><a href="https://github.com/mceachen/exiftool.rb">exiftool.rb</a> - A ruby wrapper of the exiftool, a open-source tool used to extract metadata from files.</li>
|
||||
<li><a href="https://github.com/laramies/metagoofil">metagoofil</a> - Metadata harvester</li>
|
||||
<li><a href="https://www.exploit-db.com/google-hacking-database/">Google Hacking Database</a> - a database of Google dorks; can be used for recon</li>
|
||||
<li><a href="https://github.com/JohnTroony/Google-dorks">Google-dorks</a> - Common google dorks and others you prolly don't know</li>
|
||||
<li><a href="https://github.com/k3170makan/GooDork">GooDork</a> - Command line go0gle dorking tool</li>
|
||||
<li><a href="https://github.com/jgor/dork-cli">dork-cli</a> - Command-line Google dork tool.</li>
|
||||
<li><a href="https://www.shodan.io/">Shodan</a> - Shodan is the world's first search engine for Internet-connected devices</li>
|
||||
<li><a href="https://bitbucket.org/LaNMaSteR53/recon-ng">recon-ng</a> - A full-featured Web Reconnaissance framework written in Python</li>
|
||||
<li><a href="https://github.com/techgaun/github-dorks">github-dorks</a> - CLI tool to scan github repos/organizations for potential sensitive information leak</li>
|
||||
<li><a href="https://github.com/melvinsh/vcsmap">vcsmap</a> - A plugin-based tool to scan public version control systems for sensitive information</li>
|
||||
<li><a href="http://www.spiderfoot.net/">Spiderfoot</a> - multi-source OSINT automation tool with a Web UI and report visualizations</li>
|
||||
<li><a href="https://github.com/upgoingstar/datasploit">DataSploit</a> - OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.</li>
|
||||
<li><a href="https://github.com/Smaash/snitch">snitch</a> - information gathering via dorks</li>
|
||||
<li><a href="https://github.com/Pinperepette/Geotweet_GUI">Geotweet_GUI</a> - Track geographical locations of tweets and then export to google maps.</li>
|
||||
</ul>
|
||||
|
||||
<h1 id="toc_10">Documentation</h1>
|
||||
|
||||
<h4 id="toc_11">Social Engineer resources</h4>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://www.social-engineer.org/">The Social-Engineer portal</a> - Everything you need to know as a social engineer is in this site. You will find podcasts, resources, framework, informations about next events, blog ecc...</li>
|
||||
</ul>
|
||||
|
||||
<h1 id="toc_12">Tools</h1>
|
||||
|
||||
<h4 id="toc_13">Useful tools</h4>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://www.torproject.org/">Tor</a> - The free software for enabling onion routing online anonymity</li>
|
||||
<li><a href="https://github.com/trustedsec/social-engineer-toolkit">SET</a> - The Social-Engineer Toolkit from TrustedSec</li>
|
||||
</ul>
|
||||
|
||||
<h4 id="toc_14">Phishing tools</h4>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://getgophish.com/">Gophish</a> - Open-Source Phishing Framework</li>
|
||||
<li><a href="https://github.com/securestate/king-phisher">King Phisher</a> - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.</li>
|
||||
<li><a href="https://github.com/sophron/wifiphisher">wifiphisher</a> - Automated phishing attacks against Wi-Fi networks</li>
|
||||
<li><a href="https://www.phishingfrenzy.com/">PhishingFrenzy</a> - Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns.</li>
|
||||
<li><a href="https://github.com/kgretzky/evilginx">Evilginx</a> - MITM attack framework used for phishing credentials and session cookies from any Web service</li>
|
||||
<li><a href="https://www.lucysecurity.com/">Lucy Phishing Server</a> - (commercial) tool to perform security awareness trainings for employees including custom phishing campaigns, malware attacks etc. Includes many useful attack templates as well as training materials to raise security awareness.</li>
|
||||
</ul>
|
||||
|
||||
<h1 id="toc_15">Miscellaneous</h1>
|
||||
|
||||
<h3 id="toc_16">Slides</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://www.owasp.org/images/5/54/Presentation_Social_Engineering.pdf">OWASP Presentation of Social Engineering</a> - OWASP</li>
|
||||
<li><a href="https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf">Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter</a> - Defcon 23</li>
|
||||
<li><a href="https://www.rsaconference.com/writable/presentations/file_upload/das-301_williams_rader.pdf">Using Social Engineering Tactics For Big Data Espionage</a> - RSA Conference Europe 2012</li>
|
||||
</ul>
|
||||
|
||||
<h3 id="toc_17">Videos</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20villages/DEF%20CON%2024%20Social%20Engineer%20Village%20-%20Chris%20Hadnagy%20-%207%20Jedi%20Mind%20Tricks%20Influence%20Your%20Target%20without%20a%20Word.mp4">Chris Hadnagy - 7 Jedi Mind Tricks Influence Your Target without a Word</a></li>
|
||||
<li><a href="https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20villages/DEF%20CON%2024%20Social%20Engineer%20Village%20-%20Robert%20Anderson%20-%20US%20Interrogation%20Techniques%20and%20Social%20Engineering.mp4">Robert Anderson - US Interrogation Techniques and Social Engineering.mp4</a></li>
|
||||
<li><a href="https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20villages%20video/DEF%20CON%2023%20Social%20Engineering%20Village%20-%20Ian%20Harris%20-%20Understanding%20Social%20Engineering%20Attacks%20with%20Natural%20Language%20Processing%20-%20Video.mp4">Ian Harris - Understanding Social Engineering Attacks with Natural Language Processing</a></li>
|
||||
<li><a href="https://www.youtube.com/watch?v=cI9xOR7xEi0">Chris Hadnagy - Social Engineering for Fun and Profit</a></li>
|
||||
<li><a href="https://www.youtube.com/watch?v=DoDWBe9atIo">Chris Hadnagy - Decoding humans live</a> - DerbyCon 2015</li>
|
||||
<li><a href="https://www.youtube.com/watch?v=lc7scxvKQOo">This is how hackers hack you using simple social engineering</a></li>
|
||||
</ul>
|
||||
|
||||
<h3 id="toc_18">Articles</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://www.technologyreview.com/s/526561/the-limits-of-social-engineering/">The Limits of Social Engineering</a> - MIT, Technology Review</li>
|
||||
<li><a href="http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411">The 7 Best Social Engineering Attacks Ever</a> - DarkReading</li>
|
||||
<li><a href="http://resources.infosecinstitute.com/social-engineering-compromising-users-using-office-document/">Social Engineering: Compromising Users with an Office Document</a> - Infosec Institute</li>
|
||||
<li><a href="http://blog.dilbert.com/post/129784168866/the-persuasion-reading-list">The Persuasion Reading List</a> - Scott Adams' Blog</li>
|
||||
<li><a href="https://motherboard.vice.com/en_us/article/qv34zb/how-i-socially-engineer-myself-into-high-security-facilities">How I Socially Engineer Myself Into High Security Facilities</a> - Sophie Daniel</li>
|
||||
</ul>
|
||||
|
||||
<h3 id="toc_19">Movies</h3>
|
||||
|
||||
<ul>
|
||||
<li><a href="https://en.wikipedia.org/wiki/Tiger_Team_">Tiger Team (TV series)</a></li>
|
||||
<li><a href="http://www.imdb.com/title/tt0264464/">Catch Me If You Can</a></li>
|
||||
<li><a href="http://www.imdb.com/title/tt1375666/">Inception</a></li>
|
||||
</ul>
|
||||
|
||||
<h1 id="toc_20">Contribution</h1>
|
||||
|
||||
<p>Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Please check the <a href="CONTRIBUTING.md">Contributing Guidelines</a> for more details.</p>
|
||||
|
||||
<h1 id="toc_21">License</h1>
|
||||
|
||||
<h3 id="toc_22">License</h3>
|
||||
|
||||
<p><a href="https://creativecommons.org/licenses/by/4.0/"><img src="http://i.creativecommons.org/l/by/4.0/88x31.png" alt="Creative Commons License"></a></p>
|
||||
|
||||
<p>This work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a></p>
|
||||
|
||||
|
||||
|
||||
|
||||
</body>
|
||||
|
||||
</html>
|
Loading…
Reference in New Issue
Block a user