This project is strictly for defensive security: security awareness training, red-team simulations with written authorization, and detection testing. It does not send real phishing emails, harvest credentials, or bypass protections. All offensive actions are simulated or stubbed.
Organizations need a safe way to rehearse how phishing would look without harming users. This platform models campaign lifecycles, metrics, and blue-team telemetry while keeping execution inert.
- No real email delivery (uses mock transports).
- No credential collection (uses synthetic events).
- Explicit authorization banner and audit logging.
- Default-deny: any outbound action is a no-op unless a mock backend is enabled.
Phish-Automation/
├─ docs/
│ ├─ README.md
│ ├─ architecture.md
│ ├─ threat-model.md
│ └─ ethics-and-authorization.md
├─ src/
│ ├─ app/
│ │ ├─ __init__.py
│ │ ├─ config.py
│ │ ├─ models.py
│ │ ├─ campaign.py
│ │ ├─ simulator.py
│ │ └─ metrics.py
│ ├─ api/
│ │ ├─ __init__.py
│ │ └─ routes.py
│ └─ cli.py
└─ README.md
A simulation framework for planning, validating, and measuring phishing defense readiness.
A live phishing toolkit. Anything resembling delivery, credential capture, or evasion is intentionally mocked.
python -m venv venv
source venv/bin/activate
pip install -r requirements.txt # optional; stubs run without deps
python src/cli.py demoExplains how to run tabletop exercises and purple-team simulations using synthetic events.
Describes components:
- Campaign Planner: defines scenarios (themes, targets as roles, timing windows).
- Simulator: generates synthetic opens/clicks without contacting users.
- Metrics Engine: calculates resilience scores.
- API: read-only endpoints for dashboards.
STRIDE-style model focusing on abuse prevention of this tool itself.
Rules of engagement, consent requirements, and logging obligations.
Configuration loader with safe defaults and a hard kill-switch.
Dataclasses for Campaign, Role, Scenario, Event.
Creates and validates campaigns against guardrails.
Generates synthetic events only. No network I/O.
Computes click-through risk and reporting health from synthetic data.
Read-only endpoints for metrics export.
CLI for demo runs and report export.
- Role-based difficulty curves
- Detection signal mapping (SIEM-friendly)
- Report templates for CISSP/ISO audiences
Defensive use only. Requires written authorization for any simulation involving real users.