setoolkit
TLDR
Launch the Social Engineering Toolkit
SYNOPSIS
setoolkit
sudo setoolkit
DESCRIPTION
setoolkit (Social-Engineer Toolkit) is a Python-based penetration testing framework focused on social engineering attacks. It provides automated attack vectors for phishing, credential harvesting, and payload delivery through a menu-driven interface.
The toolkit integrates with Metasploit for payload generation and exploitation. Common use cases include cloning websites to harvest credentials, generating malicious files for spear-phishing campaigns, and creating infected USB drives for physical access attacks.
SET is designed for authorized penetration testing and security awareness training. It demonstrates how attackers exploit human psychology rather than technical vulnerabilities, helping organizations understand and defend against social engineering threats.
MAIN MENU OPTIONS
1) Social-Engineering Attacks
Spear phishing, website attacks, credential harvesting, infectious media2) Penetration Testing (Fast-Track)
Rapid exploit deployment tools3) Third Party Modules
Additional community modules4) Update the Social-Engineer Toolkit
Update to latest version5) Update SET configuration
Modify configuration settings6) Help, Credits, and About
Documentation and credits99) Exit the Social-Engineer Toolkit
Quit the application
SOCIAL ENGINEERING ATTACKS
1) Spear-Phishing Attack Vectors
Email-based attacks with malicious attachments2) Website Attack Vectors
Clone websites for credential harvesting3) Infectious Media Generator
Create malicious USB/CD payloads4) Create a Payload and Listener
Generate Metasploit payloads5) Mass Mailer Attack
Send phishing emails to multiple targets6) Arduino-Based Attack Vector
USB HID attacks using Arduino7) Wireless Access Point Attack Vector
Rogue AP attacks8) QRCode Generator Attack Vector
Malicious QR codes9) Powershell Attack Vectors
Windows PowerShell-based attacks10) SMS Spoofing Attack Vector
Spoofed SMS messages
CONFIGURATION
Configuration file: /etc/setoolkit/set.config
Key settings include Apache server toggle, web interface port, email settings, and Metasploit integration paths.
CAVEATS
Requires root privileges to run. Many attacks require additional configuration (email servers, domain names, SSL certificates). The toolkit must only be used with explicit authorization—unauthorized use is illegal. Some antivirus software may flag generated payloads. The deprecated se-toolkit command has been replaced by setoolkit.
HISTORY
The Social-Engineer Toolkit was created by David Kennedy (ReL1K) at TrustedSec and first released in 2009. It was designed to provide a comprehensive platform for testing organizations' susceptibility to social engineering attacks. SET became one of the most widely used tools in penetration testing, particularly for simulating phishing campaigns and security awareness assessments. The project remains actively maintained on GitHub.
SEE ALSO
msfconsole(1), beef-xss(1), gophish(1)


