- Social Engineering Toolkit
- Social Engineer Portal
- 7 Best social Engineering attack
- Using Social Engineering Tactics For Big Data Espionage - RSA Conference Europe 2012
- Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter - Defcon 23
- OWASP Presentation of Social Engineering - OWASP
- USB Drop Attacks: The Danger of “Lost And Found” Thumb Drives
- PyPhishing Toolkit
- Best Time to send email
- Phishing on Twitter - POT
- Evilevilginx2 (is a MiTM framework used for phishing login credentials along with session cookies and can help bypass 2-factor authentication
- An amazing book: Social Engineering, 2nd Edition By Christopher Hadnagy
- How Google identified 12.4 million potential victims of phishing By Neal Mueller