Waraxe IT Security Portal
Login or Register
December 11, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 205
Members: 0
Total: 205
Full disclosure
Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group)
8 vulnerabilities in AudioCodes Fax/IVR Appliance
2 vulnerabilities in Egovframe
[REVIVE-SA-2025-005] Revive Adserver Vulnerability
Missing Critical Security Headers in Legality WHISTLEBLOWING
[REVIVE-SA-2025-004] Revive Adserver Vulnerabilities
[REVIVE-SA-2025-003] Revive Adserver Vulnerabilities
[SYSS-2025-059]: Dell computer UEFI boot protection bypass
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
APPLE-SA-11-13-2025-1 Compressor 4.11.1
Re: 83 vulnerabilities in Vasion Print / PrinterLogic
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: : "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
runc container breakouts via procfs writes: CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881
OXAS-ADV-2025-0002: OX App Suite Security Advisory
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Phishing and Social Engineering -> Social-Engineering Toolkit (SET) 0.5 released
Post new topicReply to topic View previous topic :: View next topic
Social-Engineering Toolkit (SET) 0.5 released
PostPosted: Sat Apr 17, 2010 8:10 pm Reply with quote
VERTIGO
Advanced user
Advanced user
Joined: Sep 25, 2008
Posts: 87






Quote:
Client Sides, Web Cloning and HakSaws – The Lemon Strikes Back

The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing. It's main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed. Currently SET has two main methods of attack, one is utilizing Metasploit payloads and Java-based attacks by setting up a malicious website that ultimately delivers your payload. The second method is through file-format bugs and e-mail phishing. The second method supports your own open-mail relay, a customized sendmail open-relay, or Gmail integration to deliver your payloads through e-mail. The goal of SET is to bring awareness to the often forgotten attack vector of social-engineering.


Download:
Code:
http://www.social-engineer.org
View user's profile Send private message
Social-Engineering Toolkit (SET) 0.5 released
www.waraxe.us Forum Index -> Phishing and Social Engineering
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



PCWizardHub - Helping you fix, build, and optimize your PC life
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.025 Seconds