Introduction

What?

Notes on tools used for social engineering, and experimenting with new tools.

Why?

Identify weaknesses in security training, security aptitudes of people or processes.

How?