• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

social engineering

  1. protectaccount

    Udemy Advanced Practical Initial Access (Social Engineering)

    This immersive, 250-word course description is for our course about Cyber Security titled “Advanced Tactics in Practical Initial Access and Network Penetration.” This rigorous program is fabricated for information security experts seeking to master the art of initial access, a foundational and...
  2. protectaccount

    Udemy Bash Scripting for Cybersecurity

    Are you ready to take your cybersecurity skills to the next level? In this 3hr 35-min hands-on course, Bash Scripting for Cybersecurity: Ransomware Development, you will gain hands-on experience in understanding and building a basic and an advanced ransomware script using Bash — designed for...
  3. protectaccount

    CCST Cybersecurity Video Training Series

    This course begins by establishing a solid foundation in cybersecurity essentials, exploring the CIA triad, attack vectors, and threat categories to clarify risks and vulnerabilities. It then examines attacker motivations and techniques, including malware, social engineering, denial-of-service...
  4. COMRAE911

    Practical Social Engineering - A Primer for the Ethical Hacker PDF

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  5. snake__security

    Social Engineering: The Art of Human Hacking

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  6. COMRAE911

    SOCIAL ENGINEERING - HACKING SYSTEMS, NATIONS AND SOCIETIES PDF

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  7. hack0_bin

    r4ven Track the GPS location of the user's smartphone or PC

    R4VEN Track the GPS location of the user's smartphone or PC and capture a picture of the target, along with IP and device information. Key Features...
  8. nobita1122

    Social Engineering & Phishing Mastery using AI and GoPhish

    Welcome to the “Social Engineering & Phishing Mastery with AI and GoPhish” course. Learn AI-powered Phishing with GoPhish. Create Realistic Attacks, Exploit Psychology & Build Modern Cyber Defense Skills Social engineering is basically the tactic of manipulating, influencing, or deceiving a...
  9. Legend@

    Sniffin' Out Subdomains

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  10. Legend@

    SOCIAL ENGINEERING COURSES 2022

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  11. Legend@

    Practical Social Engineering - A Primer for the Ethical Hacker PDF

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  12. Legend@

    Social Engineering: The Art of Human Hacking

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  13. Legend@

    "Social Engineering Strategies"

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  14. Jopin

    Combo Tools Sms bomber to send unlimited sms to any number

    Over 15 integrated messaging and calling APIs included with JSON Unlimited (with abuse protection) and super-fast bombing with multithreading Possibility of international API support (APIs are offline) Flexible with addition of newer APIs with the help of JSON documents Actively supported by the...
  15. dapo

    Other Vince Reynolds - Social Engineering The Art of Psychological Warfare, Human Hacking, Persuasion, and Deception (Unabridged)

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  16. dapo

    IT & Software Social engineering for absolute beginners

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  17. dapo

    IT & Software Kali Linux in Social Engineering

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  18. dapo

    IT & Software Ehtical Hacking Social Engineering with Chad Russel

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  19. dapo

    IT & Software Learn Social Engineering From Scratch

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  20. dapo

    IT & Software Cybersecurity Awareness Social Engineering

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  21. dapo

    IT & Software Ethical Hacking Social Engineering with Lisa Bock

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  22. EarlHickey

    HOW TO GET ANY OTP CODE BY SOCIAL ENGINEERING

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  23. MrMostStream

    Android Manipulation – Android Hacking With Social Engineering Full Course

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  24. EarlHickey

    Social Engineering Tools

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  25. dirtyfinger

    Crypto Wallet Sweeper Method

    [TL:DR] you can watch this vid instead, but the article is more informative! https://youtu.be/dVNfymQaGTQ Crypto-Sweeper-Bot Greetings! Today, I'd like to share with you a valuable opportunity that has the potential to help you earn a significant amount of money. In my continuous effort to...
  26. baladia

    Udemy Social Engineering with AI – Advanced Techniques

    Published: 11/2024 Created by: Ing.Seif | Europe Innovation MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: All | Genre: eLearning | Language: English | Duration: 13 Lectures ( 1h 15m ) | Size: 621 MB Master social engineering techniques, from phishing to deepfakes, and explore...
  27. Floy

    Method/Tut Social Engineering Tips for Tech

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. D'courshero

    Advanced Social Engineering Course By Sajawal Hacker

    Disclaimer: This content has been shared under Educational And Non-Profit Purposes Only in order to create awereness. We do not support or foster illegal acts. No Copyright Infringement Intended, All Rights Reserved to the Actual Owner. Link: Like and reply to access Download link *** Hidden...
  29. alioman45

    The Role of Social Engineering in Hacking

    *Introduction** While technical skills are essential for hackers, social engineering often plays a crucial role in successful attacks. This thread will discuss what social engineering is, common tactics used, and how to protect against these attacks. **What is Social Engineering?** Social...
  30. alioman45

    The Role of Social Engineering in Hacking

    Introduction** While technical skills are essential for hackers, social engineering often plays a crucial role in successful attacks. This thread will discuss what social engineering is, common tactics used, and how to protect against these attacks. **What is Social Engineering?** Social...
  31. EarlHickey

    Tutorial Social Engineering: A lesson from Hope X to DEFCON

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  32. EarlHickey

    Tutorial Social Engineering Resources

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. baladia

    IT & Software Cybersecurity Awareness: Social Engineering

    Cybersecurity Awareness: Social Engineering Released: 10/3/2023 Duration: 55m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 120 MB Genre: eLearning | Language: English [/center] Social engineering is one of the most dangerous forms of hacking because it preys on human nature. Learn how...
  34. Deadpool

    Red Team Tactics: Penetration Testing and Social Engineering

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  35. usahacker

    Method/TUT Amazon Social Engineering Trick!

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. mayoufi

    Ethically Hack Human Mind: Social Engineering Fundamentals

    Ethically Hack Human Mind: Social Engineering Fundamentals Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 455.63 MB | Duration: 0h 47m Master social engineering principles, understand human psychology, and protect against phishing attacks. What...
  37. noobsteaker

    Best Free Social Engineering Tool (SET)

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. akaah

    Android Manipulation – Android Hacking With Social Engineering Full Course

    You Will Learn: Hacking Human Brain Android Hacking Hacking Social Media Port Forwarding Bypassing Google Play Free Rats Manipulating Payload Free Rdp/Vps Topics: 1: Aiming & Analyzing The Victim 2: Getting The Technical Details (Tracking & Tracing) 3: How To Convince Your Victim 4: Choosing...
  39. rundutproject

    Hack With Social Engineering

    Social Engineering Guide Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. COMMON SE TECHNIQUES 1)Phishing...
  40. kuntilanak43

    Learn Social Engineering Full Course

    I share a full access online course, learning social engineering *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  41. imnotabdullahrao

    udemy Learn Social Engineering From Scratch

    https://freecoursesite.com/learn-social-engineering-from-scratch-6/
  42. el matadoor

    "Socialx" is a Social Engineering And RAT Tool

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  43. kingghost20

    Social Engineering

    Description Learn Social Engineering From Scratch , name of the training video series in the field of network and security, and in the branches, hack the help of social engineering (Social Engineering) can be. In this set period, the image of the first, to you hack-aided techniques, social...
  44. tronny

    Udemy - Modern Phishing Mastery Social Engineering Masterclass

    Udemy - Modern Phishing Mastery Social Engineering Masterclass 3-2024, by Rencora Security *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. jameshaarden58

    Social Engineering :The Science of Human Hacking by Christopher Hadnagy

    ocial Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire―why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this...
  46. SPKRFRQR

    THE ELLIPSIS MANUAL: Analysis and Engineering of Human Behavior

    The Elipsis Manual :: Analysis and Engineering of Human Behavior by Chase Hughes :ban: LEAVE A LIKE. DON'T BE A LEECH. :ban: ::: l i n k ::: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** :ban: LEAVE A LIKE. DON'T BE A LEECH. :ban...
  47. hgaud

    Accurately Locate Smartphones using Social Engineering

    I test on pedo lol and it's work perfectly Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. kha22lee

    Method/Tut HOW TO EARN MAKE MONEY $50/30MINUTES METHOD - 2024 NEW

    Enjoy gentlemen Don't leech or *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  49. blarmus

    Method/Tut Social engineering method

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. kha22lee

    Method/Tut ⭐ UNLIMITED BULGARIA ID CARD ☄️ SOCIAL ENGINEERING ☢️ FRONT AND BACK

    Enjoy gentlemen Don't leech or : *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom