🎭
Social Engineering Testing
Test human vulnerabilities. Manipulation, pretexting, and trust exploitation.
root@omniforge:~/services
root@omniforge:~/services# █
root@omniforge:~/services# cat overview.md
Humans are the weakest link in cybersecurity. Our social engineering testing evaluates how susceptible your employees are to manipulation tactics like pretexting, vishing, and physical social engineering. We impersonate trusted entities—IT support, vendors, executives—to extract sensitive information, gain physical access, or harvest credentials. The results identify training gaps and help build a security-aware culture.
root@omniforge:~/services# ./list-capabilities --format=grid
✓Email pretexting & business email compromise
✓Voice phishing (vishing) attacks
✓SMS phishing (smishing) campaigns
✓In-person social engineering (physical sites)
✓Help desk & IT support impersonation
✓CEO & executive impersonation
✓Vendor & third-party contractor pretexts
✓Tailgating & piggybacking tests
✓Sensitive information extraction
✓Credential harvesting & MFA bypass
✓USB drop & malicious media attacks
✓Dumpster diving & physical OSINT
root@omniforge:~/services# ./show-toolkit --category=opensource
Social-Engineer Toolkit (SET)GoPhishEvilginx2 (MFA phishing)VoIP systems for vishingCaller ID spoofing toolsOSINT frameworks (Maltego, SpiderFoot)Custom pretext scriptsRecording devices (audio/video)Hidden cameras & body camsUSB Rubber DuckyRFID badge clonersPhysical disguise kits
root@omniforge:~/services# ./pricing --display=tiers
Basic Pretexting
Starting atR12,500/engagement
$ ./social-eng --method=pretext --targets=20 --channel=email
- →Email-based pretexting attacks
- →Help desk impersonation
- →Information gathering attempts
- →Up to 20 target employees
- →Success rate analysis
- →Awareness training recommendations
Most Popular
Multi-Channel Campaign
Starting atR28,500/engagement
$ ./social-eng --methods=all --vishing=true --physical=true
- →Email, phone, and in-person testing
- →Vishing (voice phishing) attacks
- →Executive & IT staff targeting
- →Tailgating & physical access attempts
- →Sensitive information extraction
- →Credential harvesting
- →Detailed attack scenario documentation
- →Role-based vulnerability report
- →Custom training program development
Advanced Red Team Social
Starting atR48,000/engagement
$ ./social-eng --mode=redteam --duration=4w --stealth=high
- →Covert long-term operation
- →CEO & executive impersonation
- →Supply chain pretext attacks
- →Third-party vendor impersonation
- →Physical site infiltration
- →Multi-stage manipulation chains
- →Sensitive data exfiltration tests
- →Video/audio evidence documentation
- →Executive debrief & training
- →Security policy recommendations
root@omniforge:~/services# ./methodology --show=steps
[1]
Target Research & Profiling
// OSINT gathering on employees, organizational structure, communication patterns, vendor relationships
[2]
Pretext Development
// Create believable scenarios (IT support, vendor, executive) to manipulate targets
[3]
Attack Execution
// Deploy multi-channel social engineering via email, phone, or physical interaction
[4]
Analysis & Training
// Report manipulation success, identify high-risk individuals, deliver awareness training
root@omniforge:~/services# ./use-cases --list
- ▸Employee security awareness baseline
- ▸Executive & VIP vulnerability testing
- ▸Help desk security control validation
- ▸Physical security & reception testing
- ▸Third-party vendor risk assessment
- ▸Post-training effectiveness validation
- ▸Compliance requirements (ISO 27001)
- ▸Security culture improvement programs
- ▸High-risk department targeting (finance, HR)
- ▸Pre-merger security due diligence