PhishingGraph is a methodology of utilizing machine learning chatbots to identify and analyze phishing threats.
-
Updated
Apr 6, 2024 - Python
PhishingGraph is a methodology of utilizing machine learning chatbots to identify and analyze phishing threats.
Steal Axie Infinity user's token through Discord webhook.
Bien, vamos a explicar como se hace un ataque de phishing usando un correo electrónico fraudulento
This tool allows you to trick the victim to enter the username and password in a dialog box when the PC is started. These credentials are then saved. It is necessary to use a key or run the code on the victim's PC, both to insert the malware and to extract the credentials.
Using Arduino to spread malicious code via BadUSB attack. This project involves the setup and construction of a potentially harmful fake external storage device, designed to execute arbitrary code and compromise target devices. For educational and Red Teaming purpose only.
A framework to kickstart yourself in making malicious USB devices using ATTiny85.
A Phishing website (fack facebook login page) and DNS spoofing demo.
This is a project which aims to identify Social-Engineering in the domain of digital-forensics & cyber-security. The first approach is to find an abuse of the graphical-similiarity of strings.
These are the Scripts Associated with Joe's Social Forensication presentation
Script en python para crear keylogger local y remoto.
Simple SET alternative
Desafio de Projeto do Bootcamp Santander Cibersegurança - Criação de um Phishing com o Kali Linux usando a ferramenta setoolkit.
Bytesgate is a platform that helps people to understand how a social engineering attack happens, how the attackers trick them, and make them fully aware of this attack
DNSSEC Application in Terms of Cyber Security and Social Engineering: Sedres / Bachelor's Degree Thesis, Yeditepe University - 2021
AquaMarine permite acesso a cameras de smartphones e outros dispositivos. Traduzido em Portugues BR
Wifi Stealer steals all the wifi networks profiled on the target's system.
.NET implementation of the Google Safe Browsing API
Add a description, image, and links to the social-engineering-attacks topic page so that developers can more easily learn about it.
To associate your repository with the social-engineering-attacks topic, visit your repo's landing page and select "manage topics."