The Social-Engineer Toolkit (SET) v7.6.4 released
The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed to perform advanced and quick attacks against targets SET exploits the human weakness within the system rather then targeting system exploits directly SET relies on trickery and deception SET targets the human error aspect of security. it uses various custom attack vectors that allow the attacker to harvest credentials and trick users to websites they have not requested.
SET is included by default in various pentesting distrobutions such as Kali Linux, ParrotSec, BlackArch, BlackBox and has become a very popular framework with over 2 million downloads.
Changes in the new version of SET include MSSQL brute payload deliver via powershell injection.
DISCLAIMER: This is only for testing purposes and can only be used where strict consent has been given. Do not use this for illegal purposes, period.
Please read the LICENSE under readme/LICENSE for the licensing of SET.
Supported Platforms: Linux and Mac OSX
Download The Social-Engineer Toolkit (SET)
$ apt-get --force-yes -y install git apache2 python-requests libapache2-mod-php5 \ python-pymssql build-essential python-pexpect python-pefile python-crypto python-openssl
$ pacman -S --noconfirm --needed git python2 python2-beautifulsoup3 python2-pexpect python2-crypto $ wget https://github.com/erocarrera/pefile/archive/master.zip && unzip master.zip $ chmod a+x pefile-master/setup.py && rm -rf pefile-master*
$ dnf -y install git python-pexpect python-pefile python-crypto pyOpenSSL
$ yum update -y && yum install python-pexpect python-crypto python-openssl python-pefile
Mac OS X dependent
$ pip install pexpect pycrypto pyopenssl pefile
* fixed an issue where encoding messed up sql commands for mssql bruter force attack vector in fasttrack.
* fixed PEM import zipimporter error message – was more of a warning, suppressed if not using pyopenssl
* fixed a harvester not found exception in harvester
* fixed powershell teensy conversion error when printing output
- Top 10 Phishing Tools - 10th April 2020
- Distributed Hash Cracking Hashcat Hashtopolis Tutorial - 30th March 2020
- Cracking Password Hashes with Hashcat Rule-based attack - 27th March 2020