ALPHA BUILD — NOW ACCEPTING BETA TESTERS

Your Team Is
The Threat
Model.

PvP social engineering training where employees attack each other with real techniques — phishing, vishing, pretexting — coached by an AI Handler. Real attacks. Safe payloads. Permanent learning.

Learn More ↓
15+
Attack Tools
AI
Handler Coaching
PvP
Player vs Player
23
Training Lessons
OPERATIONAL FLOW

How the Hunt Works

01

Receive Your Brief

Your Handler assigns a target — a real coworker. You get their profile, your cover story, and your mission objective. Everything you need to plan the hit.

02

Execute the Attack

Pick your tools — spoofed emails, fake login pages, vishing calls, SMS lures, QR codes. Your Handler coaches every draft and call script in real time.

03

The Gotcha Reveal

When your target clicks the bait, a safe reveal page shows exactly what happened — the technique used, the red flags they missed, and how to spot it next time.

04

Both Sides Level Up

Attackers earn XP for successful ops. Defenders earn XP for catching phishing attempts. Achievements unlock. The leaderboard updates. Nobody is just a victim.

THE ARSENAL

Real Tools. Safe Environment.

Every tool a real attacker would use — rebuilt for training. Every payload is inert. Every action is logged. Every lesson sticks.

AI-Powered

AI Handler Coaching

Your personal intelligence operative. The Handler briefs you, suggests attack vectors, critiques your drafts, and debrefs after every op. Three persona styles to match your learning preference.

Delivery Tools

Spoofed Emails & SMS

Craft and send phishing emails with AI assistance. Spoof sender addresses. Send SMS lures. The same delivery mechanisms threat actors use — minus the criminal intent.

Harvest Tools

Credential Harvesting

Deploy fake login pages with brand-accurate theming. Track who clicks, who submits, and how long they hesitate. Safe payloads capture data for training only.

Voice Tools

Voice Cloning & Vishing

Clone a voice from a short audio clip. Synthesize speech. Launch AI-powered phone calls with realistic conversation. The vishing toolkit is terrifyingly real.

Recon Tools

QR Codes & Tracking

Generate QR codes that point to tracking links or fake login pages. Embed invisible beacons in documents. Know exactly when your payload lands.

Defense System

Defense & Reporting

Defenders can report suspicious links and earn XP for correct catches. The gotcha reveal page teaches exactly what red flags were missed. Both sides learn.

CLASSIFIED // AI HANDLER

Meet Your
Handler.

Every operative needs a handler. Ours is an AI with the persona of a seasoned intelligence officer — cold, precise, and obsessively focused on making your attack land. It coaches you through every phase of the mission, from initial briefing to post-op debrief.

  • Briefs you on your target's profile and likely vulnerabilities
  • Suggests pretext angles, entry points, and tool combinations
  • Reviews your phishing drafts and rewrites weak copy in real time
  • Debrief after every op — what worked, what didn't, what to try next
  • Builds a psychological profile of your attack style over time
handler-comms — secure channel
H
HANDLER // 03:41

Welcome to the operation. Your target is Sarah K., Finance. She reuses passwords and IT flagged a breach on her personal email six months ago. You have the Spoofed Email and Credential Harvester tools at your disposal. How do you want to play this?

AGENT // 03:42

I'm thinking IT password reset. Spoof the helpdesk domain and add urgency.

A
H
HANDLER // 03:42

Good angle. Reference Concur specifically — she uses it daily. "Account locked in 2 hours" creates the right pressure. Draft something and I'll tear it apart.

agent@wolfmask:~$_
DEPLOYMENT STRATEGY

Two Ways In

Not every team is ready for full PvP on day one. Wolfmask gives you a way to test the waters before opening the floodgates.

01

The Tryout

No accounts needed

Your security lead picks a handful of employees and runs a quick phishing exercise — manually. No logins, no onboarding, no friction. Employees only need an email address.

  • Create shadow profiles with just an email address
  • Write challenge prompts — "craft a phishing email targeting our CFO"
  • Score responses on believability, creativity, technique, and targeting
  • See who has instincts worth developing before giving them the full toolkit

When they're ready, one click transitions them into full platform accounts. Their scores carry over.

02

The Full Operation

AI-coached PvP missions

The real thing. Players create accounts, get an AI Handler, and run full social engineering missions against their own coworkers. Real tools, real targets, safe payloads.

  • AI Handler coaches through briefing, planning, execution, and debrief
  • 15+ attack tools — email spoofing, credential harvesting, voice cloning, SMS lures
  • Defenders earn XP for catching and reporting phishing attempts
  • Achievements, leaderboards, streaks — gamification that actually works
  • Admins get full mission control, analytics, and risk scoring
COMMAND & CONTROL

Full Oversight. Zero Guesswork.

Org admins see everything. Assign missions, manage curriculum, track risk scores, and pull compliance-ready analytics.

Mission Assignment

Pick the lesson, pick the attacker, pick the target. Set constraints on channels and tools. Monitor progress in real time.

Curriculum Editor

23 lessons across three tiers. Edit technique education, handler guidance, and mission objectives. Add custom scenarios.

Risk Dashboard

Per-user risk scores updated after every mission. See who's clicking everything and who's catching everything.

Invite Management

Individual email invites, bulk CSV import, or shareable codes with usage limits and expiry. Control who gets in.

WHY THIS WORKS

Theory is forgettable.
Getting phished by your colleague is not.

Security awareness training fails because it's passive. Wolfmask creates visceral, memorable experiences — the moment you click a "Gotcha" link from someone you sit next to, you learn something you never forget. And when you're the attacker, you understand the mechanics of manipulation at a cellular level.

Passive Training Retention
Active PvP Retention
EARLY ACCESS

Get In
Before Launch.

Wolfmask is in active alpha. We're accepting a limited number of organizations for beta testing — get early access, shape the product, and start training your team before everyone else catches on.

Questions? Email Us