Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course

Social Engineering with the Social-Engineer Toolkit

The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering. You'll explore SET, which has a number of custom attack vectors that allow you to execute advanced social engineering tactics.

Intermediate
2h 33m
(14)

Created by Gus Khawaja

Last Updated Feb 01, 2023

Course Thumbnail
  • Course

Social Engineering with the Social-Engineer Toolkit

The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering. You'll explore SET, which has a number of custom attack vectors that allow you to execute advanced social engineering tactics.

Intermediate
2h 33m
(14)

Created by Gus Khawaja

Last Updated Feb 01, 2023

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

The Social-Engineer Toolkit (SET) is an open-source Python-driven tool aimed at penetration testing around social engineering. Vulnerability scanners will find the security issues in computer systems, but cannot find them in a human being. If you want a good tool then SET is there to help you assess your company security cavity. In this course, Social Engineering with the Social-Engineer Toolkit, you'll learn the social engineering attacks that SET supports. First, you'll discover how the spear phishing attack works in SET in combination with an e-mail attack. Next, you'll explore how to use the website attack vector, along with creating a payload and a listener. Then, you'll delve into the mighty PowerShell attacks and how to take advantage of this command line tool to bypass the security on the Windows operating system. After that, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you'll learn about multiple ways to deal with the Social-Engineer Toolkit, such as the Wireless Access point attack, the QRCode generator, SMS spoofing, and the infectious media generator. By the end of this course, you'll have the fundamental knowledge to utilize the Social-Engineer Toolkit efficiently.

Social Engineering with the Social-Engineer Toolkit
Intermediate
2h 33m
(14)
Table of contents

About the author
Gus Khawaja - Pluralsight course - Social Engineering with the Social-Engineer Toolkit
Gus Khawaja
8 courses 4.2 author rating 488 ratings

Gus is an IT expert specialized in programming and security. He's a passionate blogger, geek, and loves what he's doing.

2025 Forrester Wave™ names Pluralsight as a Leader among tech skills dev platforms

See how our offering and strategy stack up.

forrester wave report