Steal Axie Infinity user's token through Discord webhook.
-
Updated
Aug 29, 2021 - JavaScript
Steal Axie Infinity user's token through Discord webhook.
Bien, vamos a explicar como se hace un ataque de phishing usando un correo electrónico fraudulento
PhishingGraph is a methodology of utilizing machine learning chatbots to identify and analyze phishing threats.
This is the updated version of blackeye with ngrok
Anti-phishing scheme using identicons and simple cryptography
Simple SET alternative
Basic Cryptography And PenTest Files
Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.
AquaMarine permite acesso a cameras de smartphones e outros dispositivos. Traduzido em Portugues BR
This is a steadily updated list of phishing attack kits designed to retrieve login details along side other personal credentials.
Bachelor's thesis on the modern threat of AI to Social Engineering
本文重点讨论了基于AI的脚本化社会工程学攻击,分析了这类攻击的特点、挑战以及如何加以防范的对策。通过对现有文献的综合分析,本文提出了一系列应对措施,旨在帮助个人、企业和政府共同应对基于AI的脚本化社会工程学攻击带来的挑战。
Detecting ☎️ Telephone-based Social Engineering Attacks Using Document 📑 Vectorization (Doc2Vec, Universal Vector Encoder), Clustering (K-means, DBSCAN, EM) and Classification of Scam Signatures
Desafio de Projeto do Bootcamp Santander Cibersegurança - Criação de um Phishing com o Kali Linux usando a ferramenta setoolkit.
Bytesgate is a platform that helps people to understand how a social engineering attack happens, how the attackers trick them, and make them fully aware of this attack
Attacking hosting webservers through WP-CLI
Phishing tool for security awareness training
Add a description, image, and links to the social-engineering-attacks topic page so that developers can more easily learn about it.
To associate your repository with the social-engineering-attacks topic, visit your repo's landing page and select "manage topics."