Simulated phishing campaigns to assess organisational vulnerability and improve security awareness.
Built controlled phishing awareness campaigns using GoPhish to simulate real-world credential harvesting and social engineering attacks β in a lab environment β to measure how susceptible teams are to phishing and improve their response.
βββββββββββββββββββ βββββββββββββββββββ βββββββββββββββββββ
β Attacker VM ββββββΆβ GoPhish Server ββββββΆβ Target Email β
β (VirtualBox) β β (SMTP Setup) β β (Lab Accts) β
βββββββββββββββββββ βββββββββββββββββββ βββββββββββββββββββ
β
βΌ
βββββββββββββββββββ
β Landing Page β
β (Fake Login) β
βββββββββββββββββββ
β
βΌ
βββββββββββββββββββ
β Creds Captured β
β (GoPhish Panel) β
βββββββββββββββββββ
| Metric | Value |
|---|---|
| Emails Sent | 50 (lab accounts) |
| Open Rate | ~65% |
| Link Click Rate | ~40% |
| Credential Submission | ~25% |
| Reported to IT | <10% |
GoPhish Β· VirtualBox Β· HTML/CSS Β· SMTP Β· Social Engineering
phishing-simulation/
βββ README.md
βββ methodology.md
βββ (lab-notes.txt β private, not uploaded)
This project was conducted entirely within a controlled lab environment. All target accounts were owned by me or set up with explicit written consent. No attacks were launched against any system without permission.