ATTACK VECTOR CATALOG
Attack Dossiers
Classified intelligence files on 8 social engineering attack vectors. Click any dossier to open the full tactical breakdown — how attackers plan it, execute it, and how to stop it.
OPERATIONAL EXERCISES
Live Simulations
You are the target. Review each attack in real-time — phishing emails, SMS messages, phone calls, and in-person scenarios — and make the right call under pressure.
0/6
CORRECT DECISIONS
📁
Select a scenario from the list
Choose any case file to begin the simulation
ANALYST TRAINING EXERCISE
Red Flag Detector
Examine the attack samples below and click every suspicious element you can identify. Train your eye to spot manipulation tactics in real messages.
🔍 Instructions: Click on any highlighted text that you believe is a red flag or manipulation tactic. Each discovery unlocks an explanation of why it's suspicious.
// RED FLAGS FOUND
0
of 0 found
ATTACKER PLAYBOOK · PSYCHOLOGICAL OPERATIONS
Psychology of Manipulation
Social engineers exploit fundamental human psychological principles identified by Dr. Robert Cialdini. Understanding these triggers is the first step to resisting them.
DEFENSIVE PROCEDURES
Defense Playbook
Verified response protocols, verification frameworks, and behavioral red flags. Print-ready reference for security-conscious professionals.
KNOWLEDGE ASSESSMENT · 12 QUESTIONS
Knowledge Quiz
Test your understanding of social engineering tactics, psychological triggers, and defensive protocols.
0 of 12 answered
0/12