Phishing Simulation Showcase
This page demonstrates common elements used in real-world phishing attacks. Explore the interactive simulations below to learn what to watch out for.

Single-Click Phishing Examples

Malicious File Download
An attacker tricks a user into downloading an executable file disguised as a legitimate document.

*This can happen instantly if browser download confirmations are disabled (a common setting for many users).

Credential Harvesting
A fake login page designed to steal credentials. Notice the URL is not the official one.
Unwanted Audio Playback
A single click can trigger sounds to startle, distract, or add false urgency. This can also be used to cause a public nuisance.

Multi-Step Phishing Examples

Clipboard Hijack
You think you're copying a safe command, but a malicious one is hidden in its place.
npm install safe-package
Test what you copied
Device Access Hijack
A link requests camera access for a false reason, but you miss and accept it by mistake and give access to your personal space.
Geolocation Tracking
A seemingly harmless button can request your physical location, revealing your whereabouts to an attacker.