Blog
Dec 19, 2010
The Art of Human Hacking
It’s hard to believe that the social-engineer.org project began 14 months ago. This project started from a simple idea to build the world’s first framework for social engineers. In these 14 months, this project has grown into the leading resource for all real social engineering education. The CTF that we held at Defcon 18 proved beyond doubt that this resource was greatly required.
2 min read

It’s hard to believe that the social-engineer.org project began 14 months ago. This project started from a simple idea to build the world’s first framework for social engineers. In these 14 months, this project has grown into the leading resource for all real social engineering education. The CTF that we held at Defcon 18 proved beyond doubt that this resource was greatly required.
Today, we are excited to announce the availability of the first, authoritative book on social engineering – “The Art of Human Hacking”.
The book was written by Chris Hadnagy, our very own Operations (manager) and published by Wiley & Sons.
Recent reviews has described the book as “innovational, educational and the best social engineering book to date. The depths to which the author dives makes the book a valuable resource for anyone in the field as well as highly engaging and entertaining”.
Social Engineering: The Art of Human Hacking has already ranked #10 in the Hacking category of Amazon’s best-seller list and it just started shipping this week. For social engineers and anyone that interacts with other people, this is bound to become an essential resource.
Stay in the know: Become an OffSec Insider
Get the latest updates about resources, events & promotions from OffSec!
Latest from OffSec

Research & Tutorials
CVE-2025-23211: Tandoor Recipes Jinja2 SSTI to Remote Code Execution
A critical SSTI vulnerability was discovered in the open-source meal planning application Tandoor Recipes leading to a full system compromise.
May 8, 2025
2 min read

Research & Tutorials
CVE-2025-29927: Next.js Middleware Authorization Bypass
In this CVE blog, we explore a vulnerability in Next.js stemming from the improper trust of the x-middleware-subrequest header.
May 1, 2025
3 min read

Enterprise Security
When AI Becomes the Weak Link: Rethinking Supply Chain Security
AI is becoming a hidden entry point in supply chain attacks. Here’s why it matters and what organizations must do to stay protected.
Apr 30, 2025
7 min read