This project is an AI agent designed to identify vulnerable employees within an organization who may be susceptible to phishing attacks. The agent uses public data sources to gather information about employees and assess their vulnerability to phishing attempts.
This tool automates the reconnaissance and campaign generation process by:
- Discovering employees within target organizations
- Enriching profiles with multi-source intelligence
- Generating unique, contextual phishing emails
- Simulating or executing email delivery
Key Differentiator from Conventional Platforms/Tools: Uses dynamic knowledge fetching (phishing trends, regional holidays, industry news) instead of hardcoded templates. Every attack is unique and culturally relevant.
- As a Security Team Leader, you can leverage this AI agent to enhance your organization's overall security posture by proactively identifying and addressing potential weaknesses in employee behavior and awareness.
- As Red Teamer, you have limited time to conduct thorough reconnaissance on all employees within a target organization. This AI agent automates the process of identifying employees who may be more susceptible to phishing attacks, allowing you to focus your efforts on high-risk targets and improve the effectiveness of your social engineering campaigns.
- As a Blue Teamer, you can use this AI agent to identify potential vulnerabilities within your organization and develop targeted training programs to improve employee awareness and resilience against phishing attacks.
This project is only an attempt to highlight the growing effectiveness of AI for Attackers while a leverage for organizations to defend as well.
An organization can conduct 100's of uniqiue attacks as 100 different attackers without need of vast library of attacks in simulation tool.
It is not intended for malicious use, and users are encouraged to use it responsibly and ethically.
This tool is intended for authorized security testing and awareness training only. See LICENSE for terms.
- Dynamic Knowledge Fetching: AI calls external tools to fetch real-time phishing trends, regional holidays, and industry intelligence
- Multi-Source Enrichment: Apollo.io, Brave Search, LinkedIn profile data
- AI-Powered Analysis: Vulnerability scoring, psychological profiling, attack vector recommendation
- SMTP Integration: Simulation mode or real email delivery via SMTP
- Complete Tracking: Database storage of all enrichment, campaigns, and results
Create .env file:
See .env.example for complete configuration options.
Safe testing without sending real emails:
- Sign up at mailtrap.io
- Get SMTP credentials
- Configure .env:
EMAIL_MODE=smtp SMTP_HOST=smtp.mailtrap.io SMTP_PORT=2525 SMTP_USERNAME=... SMTP_PASSWORD=...
- Run: python test_smtp.py
- Enrichment: ~20-25 seconds per employee (with caching)
- Content Generation: ~8-10 seconds per email
- API Costs: ~$1/month for 1000 employees (OpenAI + Brave Search)
The --email-context parameter allows you to provide additional instructions to the AI for generating more targeted phishing emails:
The AI will incorporate your custom context while maintaining the phishing simulation requirements and utilizing all available employee intelligence.
Target specific roles within an organization:
The agent automatically chooses between two attack types:
- Internal Spear Phishing: Uses real employees from the organization (fetched via AI tool)
- External Third-Party: Mimics external services with domain favicons (via favicone.com)
The AI decides which approach is most effective based on the target's vulnerability profile.
- Python 3.10+
- OpenAI API key (GPT-4o-mini recommended)
- Apollo.io API key
- Optional: Brave Search API, LinkedIn credentials
This project is licensed for non-commercial use only. See LICENSE for details.
Unauthorized use for malicious purposes is strictly prohibited. Always obtain proper authorization before conducting phishing simulations.
TL;DR AI Agent is free, open, and hackable. Run it, fork it, share it - just don't sell it as-a-service without permission.
For issues, questions, or feature requests, please open a GitHub issue.
.png)
