Added HTML export for testing purposes

This commit is contained in:
Sidney de Koning 2018-10-25 11:19:26 +02:00
parent 6cb54a0741
commit 4805b8aedd
1 changed files with 531 additions and 0 deletions

531
README.html Normal file
View File

@ -0,0 +1,531 @@
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=yes">
<title>README</title>
<style type="text/css">
body {
font-family: Helvetica, arial, sans-serif;
font-size: 14px;
line-height: 1.6;
padding-top: 10px;
padding-bottom: 10px;
background-color: white;
padding: 30px; }
body > *:first-child {
margin-top: 0 !important; }
body > *:last-child {
margin-bottom: 0 !important; }
a {
color: #4183C4; }
a.absent {
color: #cc0000; }
a.anchor {
display: block;
padding-left: 30px;
margin-left: -30px;
cursor: pointer;
position: absolute;
top: 0;
left: 0;
bottom: 0; }
h1, h2, h3, h4, h5, h6 {
margin: 20px 0 10px;
padding: 0;
font-weight: bold;
-webkit-font-smoothing: antialiased;
cursor: text;
position: relative; }
h1:hover a.anchor, h2:hover a.anchor, h3:hover a.anchor, h4:hover a.anchor, h5:hover a.anchor, h6:hover a.anchor {
background: url(data:image/png;base64,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) no-repeat 10px center;
text-decoration: none; }
h1 tt, h1 code {
font-size: inherit; }
h2 tt, h2 code {
font-size: inherit; }
h3 tt, h3 code {
font-size: inherit; }
h4 tt, h4 code {
font-size: inherit; }
h5 tt, h5 code {
font-size: inherit; }
h6 tt, h6 code {
font-size: inherit; }
h1 {
font-size: 28px;
color: black; }
h2 {
font-size: 24px;
border-bottom: 1px solid #cccccc;
color: black; }
h3 {
font-size: 18px; }
h4 {
font-size: 16px; }
h5 {
font-size: 14px; }
h6 {
color: #777777;
font-size: 14px; }
p, blockquote, ul, ol, dl, li, table, pre {
margin: 15px 0; }
hr {
background: transparent url(data:image/png;base64,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) repeat-x 0 0;
border: 0 none;
color: #cccccc;
height: 4px;
padding: 0;
}
body > h2:first-child {
margin-top: 0;
padding-top: 0; }
body > h1:first-child {
margin-top: 0;
padding-top: 0; }
body > h1:first-child + h2 {
margin-top: 0;
padding-top: 0; }
body > h3:first-child, body > h4:first-child, body > h5:first-child, body > h6:first-child {
margin-top: 0;
padding-top: 0; }
a:first-child h1, a:first-child h2, a:first-child h3, a:first-child h4, a:first-child h5, a:first-child h6 {
margin-top: 0;
padding-top: 0; }
h1 p, h2 p, h3 p, h4 p, h5 p, h6 p {
margin-top: 0; }
li p.first {
display: inline-block; }
li {
margin: 0; }
ul, ol {
padding-left: 30px; }
ul :first-child, ol :first-child {
margin-top: 0; }
dl {
padding: 0; }
dl dt {
font-size: 14px;
font-weight: bold;
font-style: italic;
padding: 0;
margin: 15px 0 5px; }
dl dt:first-child {
padding: 0; }
dl dt > :first-child {
margin-top: 0; }
dl dt > :last-child {
margin-bottom: 0; }
dl dd {
margin: 0 0 15px;
padding: 0 15px; }
dl dd > :first-child {
margin-top: 0; }
dl dd > :last-child {
margin-bottom: 0; }
blockquote {
border-left: 4px solid #dddddd;
padding: 0 15px;
color: #777777; }
blockquote > :first-child {
margin-top: 0; }
blockquote > :last-child {
margin-bottom: 0; }
table {
padding: 0;border-collapse: collapse; }
table tr {
border-top: 1px solid #cccccc;
background-color: white;
margin: 0;
padding: 0; }
table tr:nth-child(2n) {
background-color: #f8f8f8; }
table tr th {
font-weight: bold;
border: 1px solid #cccccc;
margin: 0;
padding: 6px 13px; }
table tr td {
border: 1px solid #cccccc;
margin: 0;
padding: 6px 13px; }
table tr th :first-child, table tr td :first-child {
margin-top: 0; }
table tr th :last-child, table tr td :last-child {
margin-bottom: 0; }
img {
max-width: 100%; }
span.frame {
display: block;
overflow: hidden; }
span.frame > span {
border: 1px solid #dddddd;
display: block;
float: left;
overflow: hidden;
margin: 13px 0 0;
padding: 7px;
width: auto; }
span.frame span img {
display: block;
float: left; }
span.frame span span {
clear: both;
color: #333333;
display: block;
padding: 5px 0 0; }
span.align-center {
display: block;
overflow: hidden;
clear: both; }
span.align-center > span {
display: block;
overflow: hidden;
margin: 13px auto 0;
text-align: center; }
span.align-center span img {
margin: 0 auto;
text-align: center; }
span.align-right {
display: block;
overflow: hidden;
clear: both; }
span.align-right > span {
display: block;
overflow: hidden;
margin: 13px 0 0;
text-align: right; }
span.align-right span img {
margin: 0;
text-align: right; }
span.float-left {
display: block;
margin-right: 13px;
overflow: hidden;
float: left; }
span.float-left span {
margin: 13px 0 0; }
span.float-right {
display: block;
margin-left: 13px;
overflow: hidden;
float: right; }
span.float-right > span {
display: block;
overflow: hidden;
margin: 13px auto 0;
text-align: right; }
code, tt {
margin: 0 2px;
padding: 0 5px;
white-space: nowrap;
border: 1px solid #eaeaea;
background-color: #f8f8f8;
border-radius: 3px; }
pre code {
margin: 0;
padding: 0;
white-space: pre;
border: none;
background: transparent; }
.highlight pre {
background-color: #f8f8f8;
border: 1px solid #cccccc;
font-size: 13px;
line-height: 19px;
overflow: auto;
padding: 6px 10px;
border-radius: 3px; }
pre {
background-color: #f8f8f8;
border: 1px solid #cccccc;
font-size: 13px;
line-height: 19px;
overflow: auto;
padding: 6px 10px;
border-radius: 3px; }
pre code, pre tt {
background-color: transparent;
border: none; }
sup {
font-size: 0.83em;
vertical-align: super;
line-height: 0;
}
kbd {
display: inline-block;
padding: 3px 5px;
font-size: 11px;
line-height: 10px;
color: #555;
vertical-align: middle;
background-color: #fcfcfc;
border: solid 1px #ccc;
border-bottom-color: #bbb;
border-radius: 3px;
box-shadow: inset 0 -1px 0 #bbb
}
* {
-webkit-print-color-adjust: exact;
}
@media screen and (min-width: 914px) {
body {
width: 854px;
margin:0 auto;
}
}
@media print {
table, pre {
page-break-inside: avoid;
}
pre {
word-wrap: break-word;
}
}
</style>
</head>
<body>
<h1 id="toc_0">Awesome Social Engineering</h1>
<p><a href="https://github.com/sindresorhus/awesome"><img src="https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg" alt="Awesome"></a>
<p align="center">
<img id="awesome-social-engineering" src="images/social_engineering.jpg">
</p></p>
<p>A curated list of awesome social engineering resources, inspired by the awesome-* trend on GitHub.</p>
<p>Those resources and tools are intended only for cybersecurity professional, penetration testers and educational use in a controlled environment.</p>
<p><strong>No humans were manipulated to make this list!</strong></p>
<h1 id="toc_1">Table of Contents</h1>
<ol>
<li><a href="#online-courses">Online Courses</a></li>
<li><a href="#capture-the-flag">Capture the Flag</a></li>
<li><a href="#psychology-books">Psychology Books</a></li>
<li><a href="#books">Books</a></li>
<li><a href="#osint">OSINT</a></li>
<li><a href="#documentation">Documentation</a></li>
<li><a href="#tools">Tools</a></li>
<li><a href="#miscellaneous">Miscellaneus</a></li>
<li><a href="#contribution">Contribution</a></li>
<li><a href="#license">License</a></li>
</ol>
<h1 id="toc_2">Online Courses</h1>
<ul>
<li><p><a href="https://www.social-engineer.com/social-engineering-training/">Social-Engineer.com - Social Engineering Training</a></p></li>
<li><p><a href="https://inteltechniques.com/online.aspx">IntelTechniques.com - Online OSINT Training Course</a></p></li>
<li><p><a href="https://www.udemy.com/learn-social-engineering-from-scratch">Udemy - Learn Social Engineering from Scratch</a></p></li>
<li><p><a href="https://www.packtpub.com/application-development/learn-social-engineering-scratch-video">PacktPub - Learn Social Engineering From Scratch by Zaid Sabih</a></p></li>
<li><p><a href="https://www.cybrary.it/course/social-engineering/">Cybrary - Social Engineering and Manipulation</a> - Free Course</p></li>
</ul>
<h1 id="toc_3">Capture the Flag</h1>
<h4 id="toc_4">Social-Engineer.com - The SECTF, DEFCON</h4>
<ul>
<li><a href="https://www.social-engineer.org/sevillage-def-con/the-sectf/">Social-Engineer.com - DEFCON SECTF</a></li>
</ul>
<h1 id="toc_5">Psychology Books</h1>
<p>Most of these books covers the basics of psychology useful for a social engineer.</p>
<ul>
<li><p><a href="https://www.amazon.co.uk/d/Books/How-Win-Friends-Influence-People-Dale-Carnegie/0091906814/ref=sr_1_1?ie=UTF8&amp;qid=1494621059&amp;sr=8-1&amp;keywords=how+to+win+friends+and+influence+people">How to Win Friends and Influence People - Dale Carnegie</a></p></li>
<li><p><a href="https://www.amazon.co.uk/d/Books/48-Laws-Power-Robert-Greene-Collection/1861972784/ref=sr_1_1?ie=UTF8&amp;qid=1494621512&amp;sr=8-1&amp;keywords=the+48+laws+of+power">The 48 Laws of Power - Robert Greene</a></p></li>
<li><p><a href="https://www.amazon.co.uk/d/Books/Psychology-Book-Nigel-Benson/1405391243/ref=sr_1_1?ie=UTF8&amp;qid=1494621589&amp;sr=8-1&amp;keywords=psychology">The Psychology Book</a></p></li>
<li><p><a href="https://www.amazon.co.uk/Power-Habit-Why-What-Change/dp/1847946240/ref=sr_1_1?ie=UTF8&amp;qid=1494621842&amp;sr=8-1&amp;keywords=the+power+of+habit">The Power of Habit: Why We Do What We Do, and How to Change - Charles Duhigg</a></p></li>
<li><p><a href="https://www.amazon.co.uk/d/cka/Influence-Psychology-Persuasion-Robert-B-PhD-Cialdini/006124189X/ref=sr_1_1?ie=UTF8&amp;qid=1494621912&amp;sr=8-1&amp;keywords=influence">Influence: The Psychology of Persuasion Paperback Robert B., PhD Cialdini</a></p></li>
<li><p><a href="https://www.amazon.co.uk/Emotions-Revealed-Understanding-Faces-Feelings/dp/0753817659/ref=sr_1_1?ie=UTF8&amp;qid=1494622003&amp;sr=8-1&amp;keywords=paul+ekman">Emotions Revealed: Understanding Faces and Feelings - Prof Paul Ekman</a></p></li>
<li><p><a href="https://www.amazon.co.uk/Psychology-Interrogations-Confessions-Handbook-Policing-x/dp/0470844612/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1494624501&amp;sr=1-1&amp;keywords=psychology+of+interrogation">The Psychology of Interrogations and Confessions: A Handbook - Gisli H. Gudjonsson</a></p></li>
<li><p><a href="https://www.goodreads.com/book/show/4049997-mindfucking">Mindfucking: A Critique of Mental Manipulation - Colin McGinn</a></p></li>
<li><p><a href="https://www.goodreads.com/book/show/1173576.What_Every_Body_is_Saying">What Every Body is Saying: An Ex-FBI Agent&#39;s Guide to Speed-Reading People - Joe Navarro, Marvin Karlins</a></p></li>
</ul>
<h1 id="toc_6">Books</h1>
<ul>
<li><p><a href="https://www.amazon.co.uk/Social-Engineering-Art-Human-Hacking/dp/0470639539/ref=sr_1_1?ie=UTF8&amp;qid=1494622911&amp;sr=8-1&amp;keywords=chris+hadnagy">Social Engineering: The Art of Human Hacking - Chris Hadnagy</a></p></li>
<li><p><a href="https://www.amazon.com/gp/product/111943338X/ref=dbs_a_def_rwt_bibl_vppi_i0">Social Engineering: The Science of Human Hacking</a></p></li>
<li><p><a href="https://www.amazon.com/Unmasking-Social-Engineer-Element-Security/dp/1118608577">Unmasking the Social Engineer: The Human Element of Security - Christopher Hadnagy, Dr. Ekman Paul</a></p></li>
<li><p><a href="https://www.amazon.co.uk/Phishing-Dark-Waters-Offensive-Defensive-x/dp/1118958470/ref=sr_1_fkmr0_1?ie=UTF8&amp;qid=1494622911&amp;sr=8-1-fkmr0&amp;keywords=chris+hadnagy">Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails - Christopher Hadnagy, Michele Fincher, Robin Dreeke </a></p></li>
<li><p><a href="https://www.amazon.com/Social-Engineering-Security-Techniques-Networking/dp/0071818464">Social Engineering in IT Security: Tools, Tactics, and Techniques, Sharon Conheady</a></p></li>
<li><p><a href="https://www.amazon.co.uk/No-Tech-Hacking-Engineering-Dumpster/dp/1597492159/ref=sr_1_1?ie=UTF8&amp;qid=1494624109&amp;sr=8-1&amp;keywords=no+tech+hacking">No Tech Hacking - Johnny Long, Kevin D. Mitnick</a></p></li>
<li><p><a href="https://www.amazon.it/Low-Tech-Hacking-Security-Professionals/dp/1597496650">Low Tech Hacking: Street Smarts for Security Professionals - Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers</a></p></li>
<li><p><a href="https://www.amazon.co.uk/Art-Deception-Controlling-Element-Security/dp/076454280X/ref=pd_sim_14_1?_encoding=UTF8&amp;psc=1&amp;refRID=37KD2B6G2Q981MB8D2GM">The Art of Deception: Controlling the Human Element of Security, Kevin D. Mitnick, William L. Simon</a></p></li>
<li><p><a href="https://www.amazon.com/Ghost-Wires-Adventures-Worlds-Wanted/dp/0316037729/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1494769979&amp;sr=1-1&amp;keywords=ghost+in+the+wires">Ghost in the Wires: My Adventures as the World&#39;s Most Wanted Hacker - Kevin D. Mitnick, William L. Simon, Steve Wozniak</a></p></li>
<li><p><a href="https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother/dp/0316380520/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;qid=1494770268&amp;sr=1-1">The Art of Invisibility: The World&#39;s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data - Kevin Mitnick, Robert Vamosi</a></p></li>
<li><p><a href="https://www.amazon.com/Social-Engineers-Playbook-Practical-Pretexting/dp/0692306617/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1494770673&amp;sr=1-1&amp;keywords=The+Social+Engineer%27s+Playbook%3A+A+Practical+Guide+to+Pretexting">The Social Engineer&#39;s Playbook: A Practical Guide to Pretexting - Jeremiah Talamantes</a></p></li>
<li><p><a href="https://www.packtpub.com/networking-and-servers/learn-social-engineering">Learn Social Engineering - Erdal Ozkaya</a></p></li>
</ul>
<h1 id="toc_7">OSINT</h1>
<h4 id="toc_8">OSINT Resources</h4>
<ul>
<li><a href="https://github.com/jivoi/awesome-osint">Awesome OSINT</a> - Awesome list of OSINT</li>
<li><a href="http://osintframework.com/">OSINT Framework</a> - Collection of various OSInt tools broken out by category.</li>
<li><a href="https://inteltechniques.com/menu.html">Intel Techniques</a> - A collection of OSINT tools. Menu on the left can be used to navigate through the categories.</li>
<li><a href="http://netbootcamp.org/osinttools/">NetBootcamp OSINT Tools</a> - A collection of OSINT links and custom Web interfaces to other services such as <a href="http://netbootcamp.org/facebook.html">Facebook Graph Search</a> and <a href="http://netbootcamp.org/pastesearch.html">various paste sites</a>.</li>
<li><a href="http://www.automatingosint.com/blog/">Automating OSINT blog</a> - A blog about OSINT curated by Justin Seitz, the same author of BHP.</li>
</ul>
<h4 id="toc_9">OSINT Tools</h4>
<ul>
<li><a href="https://github.com/evilsocket/xray">XRay</a> - XRay is a tool for recon, mapping and OSINT gathering from public networks.</li>
<li><a href="https://inteltechniques.com/menu.html">Intel Techniques Online Tools</a> - Use the links to the left to access all of the custom search tools.</li>
<li><a href="https://inteltechniques.com/buscador/">Buscador</a> - A Linux Virtual Machine that is pre-configured for online investigators</li>
<li><a href="http://www.paterva.com/web7/">Maltego</a> - Proprietary software for open source intelligence and forensics, from Paterva.</li>
<li><a href="https://github.com/laramies/theHarvester">theHarvester</a> - E-mail, subdomain and people names harvester</li>
<li><a href="https://github.com/ilektrojohn/creepy">creepy</a> - A geolocation OSINT tool</li>
<li><a href="https://github.com/mceachen/exiftool.rb">exiftool.rb</a> - A ruby wrapper of the exiftool, a open-source tool used to extract metadata from files.</li>
<li><a href="https://github.com/laramies/metagoofil">metagoofil</a> - Metadata harvester</li>
<li><a href="https://www.exploit-db.com/google-hacking-database/">Google Hacking Database</a> - a database of Google dorks; can be used for recon</li>
<li><a href="https://github.com/JohnTroony/Google-dorks">Google-dorks</a> - Common google dorks and others you prolly don&#39;t know</li>
<li><a href="https://github.com/k3170makan/GooDork">GooDork</a> - Command line go0gle dorking tool</li>
<li><a href="https://github.com/jgor/dork-cli">dork-cli</a> - Command-line Google dork tool.</li>
<li><a href="https://www.shodan.io/">Shodan</a> - Shodan is the world&#39;s first search engine for Internet-connected devices</li>
<li><a href="https://bitbucket.org/LaNMaSteR53/recon-ng">recon-ng</a> - A full-featured Web Reconnaissance framework written in Python</li>
<li><a href="https://github.com/techgaun/github-dorks">github-dorks</a> - CLI tool to scan github repos/organizations for potential sensitive information leak</li>
<li><a href="https://github.com/melvinsh/vcsmap">vcsmap</a> - A plugin-based tool to scan public version control systems for sensitive information</li>
<li><a href="http://www.spiderfoot.net/">Spiderfoot</a> - multi-source OSINT automation tool with a Web UI and report visualizations</li>
<li><a href="https://github.com/upgoingstar/datasploit">DataSploit</a> - OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.</li>
<li><a href="https://github.com/Smaash/snitch">snitch</a> - information gathering via dorks</li>
<li><a href="https://github.com/Pinperepette/Geotweet_GUI">Geotweet_GUI</a> - Track geographical locations of tweets and then export to google maps.</li>
</ul>
<h1 id="toc_10">Documentation</h1>
<h4 id="toc_11">Social Engineer resources</h4>
<ul>
<li><a href="https://www.social-engineer.org/">The Social-Engineer portal</a> - Everything you need to know as a social engineer is in this site. You will find podcasts, resources, framework, informations about next events, blog ecc...</li>
</ul>
<h1 id="toc_12">Tools</h1>
<h4 id="toc_13">Useful tools</h4>
<ul>
<li><a href="https://www.torproject.org/">Tor</a> - The free software for enabling onion routing online anonymity</li>
<li><a href="https://github.com/trustedsec/social-engineer-toolkit">SET</a> - The Social-Engineer Toolkit from TrustedSec</li>
</ul>
<h4 id="toc_14">Phishing tools</h4>
<ul>
<li><a href="https://getgophish.com/">Gophish</a> - Open-Source Phishing Framework</li>
<li><a href="https://github.com/securestate/king-phisher">King Phisher</a> - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.</li>
<li><a href="https://github.com/sophron/wifiphisher">wifiphisher</a> - Automated phishing attacks against Wi-Fi networks</li>
<li><a href="https://www.phishingfrenzy.com/">PhishingFrenzy</a> - Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns.</li>
<li><a href="https://github.com/kgretzky/evilginx">Evilginx</a> - MITM attack framework used for phishing credentials and session cookies from any Web service</li>
<li><a href="https://www.lucysecurity.com/">Lucy Phishing Server</a> - (commercial) tool to perform security awareness trainings for employees including custom phishing campaigns, malware attacks etc. Includes many useful attack templates as well as training materials to raise security awareness.</li>
</ul>
<h1 id="toc_15">Miscellaneous</h1>
<h3 id="toc_16">Slides</h3>
<ul>
<li><a href="https://www.owasp.org/images/5/54/Presentation_Social_Engineering.pdf">OWASP Presentation of Social Engineering</a> - OWASP</li>
<li><a href="https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf">Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter</a> - Defcon 23</li>
<li><a href="https://www.rsaconference.com/writable/presentations/file_upload/das-301_williams_rader.pdf">Using Social Engineering Tactics For Big Data Espionage</a> - RSA Conference Europe 2012</li>
</ul>
<h3 id="toc_17">Videos</h3>
<ul>
<li><a href="https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20villages/DEF%20CON%2024%20Social%20Engineer%20Village%20-%20Chris%20Hadnagy%20-%207%20Jedi%20Mind%20Tricks%20Influence%20Your%20Target%20without%20a%20Word.mp4">Chris Hadnagy - 7 Jedi Mind Tricks Influence Your Target without a Word</a></li>
<li><a href="https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20villages/DEF%20CON%2024%20Social%20Engineer%20Village%20-%20Robert%20Anderson%20-%20US%20Interrogation%20Techniques%20and%20Social%20Engineering.mp4">Robert Anderson - US Interrogation Techniques and Social Engineering.mp4</a></li>
<li><a href="https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20villages%20video/DEF%20CON%2023%20Social%20Engineering%20Village%20-%20Ian%20Harris%20-%20Understanding%20Social%20Engineering%20Attacks%20with%20Natural%20Language%20Processing%20-%20Video.mp4">Ian Harris - Understanding Social Engineering Attacks with Natural Language Processing</a></li>
<li><a href="https://www.youtube.com/watch?v=cI9xOR7xEi0">Chris Hadnagy - Social Engineering for Fun and Profit</a></li>
<li><a href="https://www.youtube.com/watch?v=DoDWBe9atIo">Chris Hadnagy - Decoding humans live</a> - DerbyCon 2015</li>
<li><a href="https://www.youtube.com/watch?v=lc7scxvKQOo">This is how hackers hack you using simple social engineering</a></li>
</ul>
<h3 id="toc_18">Articles</h3>
<ul>
<li><a href="https://www.technologyreview.com/s/526561/the-limits-of-social-engineering/">The Limits of Social Engineering</a> - MIT, Technology Review</li>
<li><a href="http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411">The 7 Best Social Engineering Attacks Ever</a> - DarkReading</li>
<li><a href="http://resources.infosecinstitute.com/social-engineering-compromising-users-using-office-document/">Social Engineering: Compromising Users with an Office Document</a> - Infosec Institute</li>
<li><a href="http://blog.dilbert.com/post/129784168866/the-persuasion-reading-list">The Persuasion Reading List</a> - Scott Adams&#39; Blog</li>
<li><a href="https://motherboard.vice.com/en_us/article/qv34zb/how-i-socially-engineer-myself-into-high-security-facilities">How I Socially Engineer Myself Into High Security Facilities</a> - Sophie Daniel</li>
</ul>
<h3 id="toc_19">Movies</h3>
<ul>
<li><a href="https://en.wikipedia.org/wiki/Tiger_Team_">Tiger Team (TV series)</a></li>
<li><a href="http://www.imdb.com/title/tt0264464/">Catch Me If You Can</a></li>
<li><a href="http://www.imdb.com/title/tt1375666/">Inception</a></li>
</ul>
<h1 id="toc_20">Contribution</h1>
<p>Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Please check the <a href="CONTRIBUTING.md">Contributing Guidelines</a> for more details.</p>
<h1 id="toc_21">License</h1>
<h3 id="toc_22">License</h3>
<p><a href="https://creativecommons.org/licenses/by/4.0/"><img src="http://i.creativecommons.org/l/by/4.0/88x31.png" alt="Creative Commons License"></a></p>
<p>This work is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a></p>
</body>
</html>