Social-Engineer Toolkit

The Social-Engineer Toolkit is an open source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.

Social-Engineer Toolkit screenshot 1

Cost / License

  • Free
  • Open Source

Application type

Platforms

  • Mac
  • Linux
  • Python
-
No reviews
19likes
0comments
0news articles

Features

Suggest and vote on features
  1.  Penetration Testing

 Tags

  • social-engineering
  • hacking

Social-Engineer Toolkit News & Activities

Highlights All activities

Recent activities

Social-Engineer Toolkit information

  • Developed by

    US flagTrustedSec
  • Licensing

    Open Source and Free product.
  • Alternatives

    13 alternatives listed
  • Supported Languages

    • English
Social-Engineer Toolkit was added to AlternativeTo by Tim_B on and this page was last updated . Social-Engineer Toolkit is sometimes referred to as SET
No comments or reviews, maybe you want to be first?

Featured in Lists

Software used by the hackers in the Emmy and Golden Globe award winning drama/thriller series Mr. Robot. **THIS LIST …

List by Tim_B with 33 apps, updated

Software used for 'hacking', privacy, etc.

List by keeganjk with 47 apps, updated

A list with 17 apps by Reptevye without a description.

List by Robert with 17 apps, updated

What is Social-Engineer Toolkit?

The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community. The Social-Engineer Toolkit has over 2 million downloads and is aimed at leveraging advanced technological attacks in a social-engineering type environment. TrustedSec believes that social-engineering is one of the hardest attacks to protect against and now one of the most prevalent. The toolkit has been featured in a number of books including the number one best seller in security books for 12 months since its release, “Metasploit: The Penetrations Tester’s Guide” written by TrustedSec’s founder as well as Devon Kearns, Jim O’Gorman, and Mati Aharoni.