Social-Engineer Toolkit v1.4 latest Version !
The Social Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of penetration testing. It’s main purpose is to augment and simulate social-engineering attacks and allow the tester to effectively test how a targeted attack may succeed.
Official change log:
Java changed how self signed certificates work. It shows a big UNKNOWN now, modified self sign a bit.
Added the ability to purchase a code signing certificate and sign it automatically. You can either import or create a request.
Fixed a bug in the wifi attack vector where it would not recognize /usr/local/sbin/dnsspoof as a valid path
Fixed a bug in the new backtrack5 to recognize airmon-ng
Added the ability to import your own code signed certificate without having to generate it through SET
Fixed an issue where the web templates would load two java applets on mistake, it now is correct and only loads one
Fixed a bounds exception issue when using the SET interactive shell, it was using pexpect.spawn and was changed to subprocess.Popen instead
Added better import detection and error handling around the python module readline. Older versions of python may not have, if it detects that python-readline is not installed it will disable tab completion
Added a new menu to the main SET interface that is the new verified codesigning certificate menu
Fixed a bug with the SET interactive shell that if you selected a number that was out of the range of shells listed, it would hang. It now throws a proper exception if an invalid number or non-numeric instance is given for input
Added more documentation around the core modules in the SET User_Manual
Updated the SET_User manual to reflect version 1.4
Download The Social-Engineer Toolkit v1.4 Here