social-engineer-toolkit/readme/CREDITS
2013-10-30 16:50:24 -04:00

66 lines
4.3 KiB
Text

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Special thanks to the following people who have contributed to SET:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
* Infection Guide Using Java/VbScript by AnalyseR: http://www.exploit-db.com/papers/12991/
* The Social Engineer Framework http://social-engineer.org
* LoganWHD for his efforts on the Framework and testing out the pre-alpha of SET.
* Elwood for his testing out and bug reporting through the release.
* HD Moore for Metasploit of course!
* Special thanks to Thomas Werth and his Java Applet attack, it is amazing!!
* Special thanks to Kyle Osborn for providing the Man Left in the Middle attack
* Special thanks to Ernest for the SSL idea for Credential Harvesting
* Greg Foss for reporting a local XSS vuln with credential harvester/tabnabbing
* Kevin Mitnick for new additions, ideas, improvements, testing, and Java Repeater fix!
* white_sheep, emgent, and the Back|Track crew for the web jacking attack vector
* Garland for the BeEF PowerShell addon
* Crag Balding for the patch to fix a bug in web cloner
* Lampis Alevizos for the repeater java_applet idea
* Thomas Roth for the patch to the java_applet.pde teensy fix
* Didier Stevens for his disitool that does the digital signature stealing
* Thanks to Matt for figuring out the <frame> issues with the docbase attack and help with the java repeater
* Jim O'Gorman (elwood) for the UNC path attack idea
* Peter Osterberg for the wscript modifications to support Windows 7
* Thanks for PadZero for the multi-language support in Teensy HID and bug fixes
* Special thanks to muts for the paramiko SSH tunneling idea!!
* Hugo Caron (y0ug) for the new gnome_wget.pde teensy addition
* Thanks to sami8007 and Trcx for the dsniff addition to SET
* Jonathan Murray for the email priority addition to the mass mailer and spear phishing attack modules
* Special thanks to the TB-Security.com team for creating the SMS spoofing.
* Thomas Werth, for his addition to SET with RATTE
* Elwood for his idea on the wireless attack vector
* Mister X for allowing airbase-ng to be included into SET
* Thanks for Brandon Murphy for the report on the bug for download in the SET interactive shell and some feature ideas
* Thanks for pr1me for bringing to my attention a couple of bugs and the fixes for them
* Larry Pesce, Luca Grembo for bug reports
* Chris John Riley for his list of bugs and feature requests... I'm still working on them! :)
* RejectedManiac for the fix on the wireless access point channel specification
* Darkther4py for finding a bug in the SET create payload/ratte issue
* Josh Kelley (winfang98) for his awesome stuff with the teensy and help with the presentations at BSIDES and Defcon
* To digip for the version 2.0 idea!
* To Marc Doudiet for working on the vbs version of the teensy exe converter
* Thanks to Jose Hernandez for the bug reports!
* Bernardo Damele for shellcodeexec
* Thanks to Matthew Graeber for the powershell injection technique http://www.exploit-monday.com/2011/10/exploiting-powershells-features-not.html
* Dale Lakes for his additions into check_mssql
* Dale Pearson for finding all the bugs in my code :)
* Leg3nd for some fixes on the java applet
* f8lerror for reporting the multiattack bug
* Thanks to Olie and his unnamed coworker for a quick patch to define users home path versus static root directory
* Thanks to Stephen Haywood for his patch to the smtp module for bug fix
* Thanks to Justin Elze for the idea on the QRCode Attack vector
* Thanks to chap0 for the phishing email template added to the phishing attack vector
* Thanks for Jeremy Miller for the DEPLOY_BINARIES idea and being able to turn them off and only use POWERSHELL_INJECTION
* Python shellcode injection from Debasish Mandal
* Credit to jduck for posting the pastebin of the PoC for the java applet zero day *hugs*
* Offensive-Security's Peensy project - http://www.offensive-security.com/offsec/advanced-teensy-penetration-testing-payloads/
* Thanks to Stephen Haywood (averagesecurityguy) for talking me into moving to github
* Thanks to Larry Spohn (spoonman) for the python udp 1434 sql discovery code
* Persistence on OSX - http://patrickmosca.com/root-a-mac-in-10-seconds-or-less/
The Social-Engineer Development Team:
Dave Kennedy (ReL1K)
JR DePre (pr1me)
Thomas Werth
Joey Furr (j0fer)