Steal Axie Infinity user's token through Discord webhook.
-
Updated
Aug 29, 2021 - JavaScript
Steal Axie Infinity user's token through Discord webhook.
Bien, vamos a explicar como se hace un ataque de phishing usando un correo electrónico fraudulento
This is the updated version of blackeye with ngrok
Anti-phishing scheme using identicons and simple cryptography
Simple SET alternative
PhishingGraph is a methodology of utilizing machine learning chatbots to identify and analyze phishing threats.
Basic Cryptography And PenTest Files
Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.
This is a steadily updated list of phishing attack kits designed to retrieve login details along side other personal credentials.
Bachelor's thesis on the modern threat of AI to Social Engineering
AquaMarine permite acesso a cameras de smartphones e outros dispositivos. Traduzido em Portugues BR
本文重点讨论了基于AI的脚本化社会工程学攻击,分析了这类攻击的特点、挑战以及如何加以防范的对策。通过对现有文献的综合分析,本文提出了一系列应对措施,旨在帮助个人、企业和政府共同应对基于AI的脚本化社会工程学攻击带来的挑战。
Detecting ☎️ Telephone-based Social Engineering Attacks Using Document 📑 Vectorization (Doc2Vec, Universal Vector Encoder), Clustering (K-means, DBSCAN, EM) and Classification of Scam Signatures
Desafio de Projeto do Bootcamp Santander Cibersegurança - Criação de um Phishing com o Kali Linux usando a ferramenta setoolkit.
Bytesgate is a platform that helps people to understand how a social engineering attack happens, how the attackers trick them, and make them fully aware of this attack
Attacking hosting webservers through WP-CLI
Phishing tool for security awareness training
Add a description, image, and links to the social-engineering-attacks topic page so that developers can more easily learn about it.
To associate your repository with the social-engineering-attacks topic, visit your repo's landing page and select "manage topics."