Important Information
This is an educational security awareness simulator designed to demonstrate common attack vectors in a safe, controlled environment.
What This Simulation Does:
- Presents realistic phishing emails and social engineering scenarios
- Simulates fake login pages (all data stays local in your browser)
- Demonstrates USB drop attack scenarios (no actual file access)
- Tracks your responses to provide educational feedback
Ethical Boundaries:
- ✓ All data is stored locally (no server transmission)
- ✓ No real credentials are collected or stored
- ✓ This is for educational purposes only
- ✓ You can reset your data at any time
- ✗ Do not use this to deceive others without consent
- ✗ Do not use these techniques in real environments
By proceeding, you acknowledge this is a training simulation and agree to use it responsibly for educational purposes only.
Select Your Role: