Social Engineering

Tools for exploiting the human mind.

7 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

Beelogger 

Open-source      

Tool for generating keyloggers for Windows

Catphish 

Open-source    

Ruby phishing toolkit

Evilginx2 

Open-source      

MITM attack framework used for phishing credentials and session cookies with 2-factor bypass

Gophish 

Open-source      

Powerful, open-source phishing framework to simulate and manage phishing campaigns

King Phisher 

Open-source      

Create and manage simultaneous phishing attacks with server and content tools

Social Engineer Toolkit (SET) 

Open-source      

Social engineering toolkit with framework

wifiphisher 

Open-source    

Automated phishing attacks against WiFi networks for red teaming or WiFi investigations