Search⌘ K
AI Features

Social-Engineer Toolkit (SET)

Explore how to use the Social-Engineer Toolkit (SET) to perform various social engineering attacks, including credential harvesting via cloned websites. Understand how SET automates attack vectors, enabling penetration testers to identify risks by simulating phishing, spoofing, and other tactics targeting human weaknesses in information security.

What is the SET?

Social engineering is sometimes referred to as the art or science of manipulation. Since it involves the human element, social engineering attacks need to be highly flexible and attackers need to switch strategies on the fly, especially when aiming for particularly high-profile or difficult targets. After conducting due research on their target, the attacker plays off deep, human-rooted impulses, such as fear, anxiety, desire, and empathy. The attacker hijacks the target’s train of thought and manipulates them to do their bidding without giving themselves away.

In order to automate the ever-changing vectors of social engineering attacks, cybersecurity firm TrustedSec released the Soci ...