The Social Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed
- Java changed how self signed certificates work. It shows a big UNKNOWN now, modified self sign a bit.
- Added the ability to purchase a code signing certificate and sign it automatically. You can either import or create a request.
- Fixed a bug in the wifi attack vector where it would not recognize /usr/local/sbin/dnsspoof as a valid path
- Fixed a bug in the new backtrack5 to recognize airmon-ng
- Added the ability to import your own code signed certificate without having to generate it through SET
- Fixed an issue where the web templates would load two java applets on mistake, it now is correct and only loads one
- Fixed a bounds exception issue when using the SET interactive shell, it was using pexpect.spawn and was changed to subprocess.Popen instead
- Added better import detection and error handling around the python module readline. Older versions of python may not have, if it detects that python-readline is not installed it will disable tab completion
- Added a new menu to the main SET interface that is the new verified codesigning certificate menu
- Fixed a bug with the SET interactive shell that if you selected a number that was out of the range of shells listed, it would hang. It now throws a proper exception if an invalid number or non-numeric instance is given for input
- Added more documentation around the core modules in the SET User_Manual
- Updated the SET_User manual to reflect version 1.4
LINK TO OUR HOME PAGE :