Pick from a selection of hand-crafted campaigns.
Emulates the tradecraft seen in real-world, email-based attacks i.e. NOBELIUM's use of DLL-launching LNKs packed into ISOs.
Evasion techniques such as VBA Stomping, analysis resistance measures, and alternative execution methods.
Payloads using HTML smuggling to hide executable content, i.e. .exe and .ps1 inside HTML files.
A broad range of file types, all benign, giving you an idea of which formats can reach your mailbox.
Send yourself payloads ranging from:
Optionally integrate delivr.to with your O365/GSuite account and let it determine what was delivered. It'll even check the attachment to make sure it hasn't been stripped by your mail filters.
Produce rich and engaging graphics to help you measure improvement and communicate the findings.
Let us help you find the best solution.Contact sales