mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-22 02:43:02 +00:00
Merge pull request #54 from The-Art-of-Hacking/evil-nginx2
Adding evil nginx2
This commit is contained in:
commit
0f6176d474
1 changed files with 13 additions and 10 deletions
|
@ -1,12 +1,15 @@
|
||||||
# Social Engineering
|
# Social Engineering
|
||||||
|
|
||||||
* [Social Engineering Toolkit](https://github.com/trustedsec/social-engineer-toolkit)
|
- [Social Engineering Toolkit](https://github.com/trustedsec/social-engineer-toolkit)
|
||||||
* [Social Engineer Portal](https://www.social-engineer.org/)
|
- [Social Engineer Portal](https://www.social-engineer.org/)
|
||||||
* [7 Best social Engineering attack](http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411)
|
- [7 Best social Engineering attack](http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411)
|
||||||
* [Using Social Engineering Tactics For Big Data Espionage - RSA Conference Europe 2012](https://www.rsaconference.com/writable/presentations/file_upload/das-301_williams_rader.pdf)
|
- [Using Social Engineering Tactics For Big Data Espionage - RSA Conference Europe 2012](https://www.rsaconference.com/writable/presentations/file_upload/das-301_williams_rader.pdf)
|
||||||
* [Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter - Defcon 23](https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf)
|
- [Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter - Defcon 23](https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf)
|
||||||
* [OWASP Presentation of Social Engineering - OWASP](https://www.owasp.org/images/5/54/Presentation_Social_Engineering.pdf)
|
- [OWASP Presentation of Social Engineering - OWASP](https://www.owasp.org/images/5/54/Presentation_Social_Engineering.pdf)
|
||||||
* [USB Drop Attacks: The Danger of “Lost And Found” Thumb Drives](https://www.redteamsecure.com/usb-drop-attacks-the-danger-of-lost-and-found-thumb-drives/)
|
- [USB Drop Attacks: The Danger of “Lost And Found” Thumb Drives](https://www.redteamsecure.com/usb-drop-attacks-the-danger-of-lost-and-found-thumb-drives/)
|
||||||
* [PyPhishing Toolkit](https://github.com/redteamsecurity/PyPhishing)
|
- [PyPhishing Toolkit](https://github.com/redteamsecurity/PyPhishing)
|
||||||
* [Best Time to send email](https://coschedule.com/blog/best-time-to-send-email/)
|
- [Best Time to send email](https://coschedule.com/blog/best-time-to-send-email/)
|
||||||
* [Phishing on Twitter - POT](https://www.kitploit.com/2018/02/pot-phishing-on-twitter.html)
|
- [Phishing on Twitter - POT](https://www.kitploit.com/2018/02/pot-phishing-on-twitter.html)
|
||||||
|
- [Evilevilginx2 (is a MiTM framework used for phishing login credentials along with session cookies and can help bypass 2-factor authentication](https://github.com/kgretzky/evilginx2]
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue