Top nine phishing simulators [updated 2021]

March 12, 2021 by Andrei Antipov

The title of this article was supposed to be “Top 9 Free Phishing Simulators.” However, after much searching, trying, visiting of broken links, filling out forms and signing up for mailing lists, it became clear that the combination of “free” and “top” really narrows down the selection to very few actual choices for phishing training. The final list does not include any of the fishy (pardon the pun) apps that let you create a fake website or phishing site for collecting data. Nor are we including any of the free managed campaigns offered by so many now popular phishing services. We wanted to focus on tools that allow you to actually run a phishing campaign on your own, i.e. create and send at least one phishing email to a real recipient.

Note: Want more than just a phishing simulator? Check out our article on the best security awareness training.

Basically, if you are looking for a free phishing simulator for your company, you are down to three choices:

  1. Simple tools that will allow you to craft a simple email message and send it to one or several recipients using a specified mail server. Features like reporting or campaign management are often not an option, making them more like penetration testing tools than phishing simulators.
  2. Open-source phishing platforms. This is a growing and interesting category, which makes up the majority of our list. With open-source, you get all the usual benefits, such as feature-rich free versions and community support. But all the usual shortcomings are there as well: tools like this usually require some significant technical skills to install, configure, and run. Additionally, most of them are Linux-based. So, if words like “missing dependencies” don’t sound like an alien tongue, then this category may be of interest to you. Otherwise, there is the third choice.
  3. Demo versions of commercial products. The majority of commercial phishing simulators are offered as software-as-a-service (SaaS). With those, you usually get the best of all worlds: ease of use, rich features (including reporting), technical support, etc. With phishing being among the top cybersecurity risks and commercial phishing simulators popping up like mushrooms after a rain, finding a free demo seems like an easy task. That is, until you actually try.In most cases, the best can you get after jumping through various hoops (filling out a request form, subscribing to a mailing list, confirming your email address, etc.) is a free campaign managed by the vendor, or a demo account with so many limitations that it doesn’t even give you a good understanding of the full version’s capabilities, let alone providing you with an actual tool that you can effectively use to create and manage multiple phishing campaigns. The most likely scenario for SaaS phishing platforms is a scheduled demonstration, which may or may not result in you obtaining access to a version of product that you can actually use. There is, however, an exception to this rule, which you will see on top of our list.

Top nine phishing simulators

1. Infosec IQ

Infosec IQ by Infosec includes a free Phishing Risk Test that allows you to launch a simulated phishing campaign automatically and receive your organization’s phish rate in 24 hours.

You can also access Infosec IQ’s full-scale phishing simulation tool, PhishSim, to run sophisticated simulations for your entire organization. PhishSim contains a library of 1,000+ phishing templates, attachments and data entry landing pages. PhishSim templates are added weekly, allowing you to educate employees on the most topical phishing scams. Want to build your own phishing emails? PhishSim has a drag-and-drop template builder so you can build your phishing campaigns to your exact specification.

Signing up for a free Infosec IQ account gets you full access to the PhishSim template library and education tools, but you’ll need to speak with an Infosec IQ representative for the ability to launch a free PhishSim campaign.

Infosec offers a FREE personalized demo of the Infosec IQ simulated phishing and security awareness platform. Click here to get started.

2. Gophish

As an open-source phishing platform, Gophish gets it right. It is supported by most operating systems, installation is as simple as downloading and extracting a ZIP folder, the interface is simple and intuitive, and the features, while limited, are thoughtfully implemented. Users are easily added, either manually or via bulk CSV importing. Email templates are easy to create (there aren’t any included though, with a community-supported repository initiated) and modify (using variables allows for easy personalization), creating campaigns is a straightforward process, and reports are pleasant to look at and can be exported to CSV format with various levels of detail. Major drawbacks: no awareness education components and no campaign scheduling options.



The first commercial product on our list, LUCY provides a hassle-free download of the free (community) version of the platform. All you need is your email address and name, and you can download LUCY as a virtual appliance or a Debian install script. The web interface is attractive (if a bit confusing), and there are lots of features to explore: LUCY is designed as a social engineering platform that goes beyond phishing. The awareness element is there as well with interactive modules and quizzes. So, why didn’t we place LUCY higher up the list? Because we are talking about free phishing simulators, and the community version of LUCY has too many limitations to be effectively used in an enterprise environment. Some important features are not available under community license, such as exporting campaign stats, performing file (attachment) attacks, and, most importantly, campaign scheduling options. With that, the free version of LUCY gives you a taste of what the paid version is capable of, but doesn’t go much farther than that.


4. Simple Phishing Toolkit (sptoolkit)

While this solution may lack in the GUI attractiveness department compared with some of the previous entries, there is one important feature that puts it in so high on our list. Simple Phishing Toolkit provides an opportunity to combine phishing tests with security awareness education, with a feature that (optionally) directs phished users to a landing page with an awareness education video. Moreover, there is a tracking feature for users who completed the training. Unfortunately, the sptoolkit project has been abandoned back in 2013. A new team is trying to give it a new life, but as of now, the documentation is scarce and scattered all over the internet, making realistic implementation in an enterprise environment a difficult task.


5. Phishing Frenzy

While this open-source Ruby on Rails application is designed as a penetration testing tool, it has many features that could make it an effective solution for internal phishing campaigns. Perhaps the most important feature is the ability to view detailed campaign stats and easily save the information to a PDF or an XML file. You can probably guess the “however” part that’s coming up: Phishing Frenzy is a Linux-based application, with installation not to be handled by a rookie.


6. King Phisher

With this open-source solution from SecureState, we are entering the category of more sophisticated products. King Phisher’s features are plentiful, including the ability to run multiple campaigns simultaneously, geo location of phished users, web cloning capabilities, etc. A separate template repository contains templates for both messages and server pages. User interface is clean and simple. What is not that simple, however, is installation and configuration. King Fisher server is only supported on Linux, with additional installation and configuration steps required depending on flavor and existing configuration.


7. SpeedPhish Framework (SPF)

Another Python tool created by Adam Compton. SPF includes many features that allow you to quickly configure and perform effective phishing attacks, including data entry attack vector (3 website templates are included, with possibility of using custom templates as well). While a tech-savvy security professional can have a lot of fun with SPF and will be able to run phishing campaigns against multiple targets, it is still mainly a pentesting tool, with many great features (such as email address gathering) being of little importance for someone performing internal phishing tests.


8. Social-Engineer Toolkit (SET)

Another tool from TrustedSec, which, as the name suggests, was designed for performing various social engineering attacks. For phishing, SET allows for sending spear-phishing emails as well as running mass mailer campaigns, as well as some more advanced options, such as flagging your message with high importance and adding list of target emails from a file. SET is Python based, with no GUI. As a penetration testing tool, it is very effective. As a phishing simulation solution, it is very limited and does not include any reporting or campaign management features.


9. SpearPhisher BETA

This tool isn’t trying to deceive anyone (other than its phishing targets). Developed by TrustedSec, SpearPhisher says it all right in the description: “A Simple Phishing Email Generation Tool.” With an emphasis on ‘simple.’ Designed for non-technical users, SpearPhisher is a Windows-based program with a straightforward GUI. It allows you to quickly craft a phishing email with customized From Email, From Name, and Subject fields and includes a WYSIWYG HTML editor and an option to include one attachment. You can send the crafted email to several recipients via adding email addresses to To, CC, and BCC fields. The program has been in Beta since 2013, so it’s not likely to see any updates in the near future.

Posted: March 12, 2021
Andrei Antipov
View Profile

Andrei is a Security Engineer. He holds a Cybersecurity degree from Bellevue University, is an Associate of (ISC)2 toward CCFP and Metasploit Pro Certified Specialist. Andrei is interested in reading and writing about all things infosec, with focus on security governance, penetration testing, and digital forensics. In his spare time, he enjoys spending time with his family and talking about weird movies and trip-hop.