Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Astra Pentest Reviews & Ratings
    254 Ratings
    Company Website
  • NINJIO Reviews & Ratings
    415 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    231 Ratings
    Company Website
  • Josys Reviews & Ratings
    245 Ratings
    Company Website
  • Carbide Reviews & Ratings
    88 Ratings
    Company Website
  • Admiral Reviews & Ratings
    68 Ratings
    Company Website
  • QA Wolf Reviews & Ratings
    259 Ratings
    Company Website
  • Haast Reviews & Ratings
    1 Rating
    Company Website
  • Birdeye Reviews & Ratings
    5,030 Ratings
    Company Website
  • dbt Reviews & Ratings
    251 Ratings
    Company Website

What is Social-Engineer Toolkit (SET)?

Created by Dave Kennedy, who is the founder of TrustedSec, the Social-Engineer Toolkit (SET) is an open-source resource developed in Python that specializes in penetration testing focused on social engineering techniques. This toolkit has made appearances at prominent cybersecurity events, including Blackhat, DerbyCon, Defcon, and ShmooCon. With an impressive milestone of more than two million downloads, SET has established itself as the preferred tool for executing social-engineering penetration tests, garnering significant backing from the cybersecurity community. Its architecture is specifically designed to leverage advanced technological vulnerabilities within the realm of social engineering. TrustedSec highlights that social engineering represents one of the most significant challenges in cybersecurity and has grown more prevalent in the current threat landscape. As a result, the toolkit is an essential asset for security experts seeking to bolster their defenses against these intricate and evolving tactics. Its continuous updates and community contributions ensure that SET remains relevant in addressing new challenges in the field.

What is BreachLock?

Cloud, DevOps, and SaaS security testing often comes with high costs, intricate processes, and sluggish performance. In contrast, BreachLockâ„¢ offers a streamlined alternative. This on-demand, cloud-based security testing platform is designed to assist you in demonstrating compliance for large enterprise clients, rigorously testing your application prior to its release, and safeguarding your comprehensive DevOps environment. With BreachLockâ„¢, you can enhance your security posture efficiently without the usual headaches associated with traditional testing methods.

Media

Media

Integrations Supported

FieldWare

Integrations Supported

FieldWare

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

TrustedSec

Date Founded

2012

Company Location

United States

Company Website

www.trustedsec.com/tools/the-social-engineer-toolkit-set/

Company Facts

Organization Name

BreachLock

Company Location

United States

Company Website

www.breachlock.com

Categories and Features

Categories and Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Popular Alternatives

Astra Pentest Reviews & Ratings

Astra Pentest

Astra Security
Pentoma Reviews & Ratings

Pentoma

SEWORKS
CyBot Reviews & Ratings

CyBot

Cronus Cyber Technologies