Cybersecurity Simulation
Initialising...

Share your result

Challenge your colleagues to beat your score

Dual POV Simulation

PARALLAX

Same breach. Two positions. Everything changes.

🦹 Play the attacker
🧑‍💻 Play the defender
Real tools & commands
📖 Learn both sides
🔍
OSINT Reconnaissance
Harvest emails, scan Shodan, map the attack surface before a single packet is sent.
★☆☆ Beginner
theHarvesterShodanMaltego
🎣
Phishing Campaign
Clone login pages, bypass MFA with evilginx2, and establish OAuth persistence.
★☆☆ Beginner
evilginx2GoPhishSET
🌐
Network Intrusion
Exploit CVEs with Metasploit, dump credentials, move laterally to the Domain Controller.
★★☆ Intermediate
nmapMetasploitMimikatz
🎭
Social Engineering
Spoof caller ID, impersonate vendors, and extract VPN credentials from helpdesk staff.
★★☆ Intermediate
SpoofCardVishingPretexting
⬆️
Privilege Escalation
Exploit sudo misconfigs, abuse AD ACLs with BloodHound, escalate to Domain Admin.
★★★ Advanced
LinPEASBloodHoundPowerView
💀
Ransomware Deployment
Disable EDR via GPO, corrupt backups, encrypt 134 systems, demand $2.4M ransom.
★★★ Advanced
Cobalt StrikePsExecC2

OSINT Reconnaissance

Choose your starting role

🦹
Attacker
Execute the attack step by step using real tools and techniques. Learn how breaches actually happen.
Go first
🧑‍💻
SOC Analyst
Detect, investigate and contain the attack using real defensive tools and incident response procedures.
Go second
Score: 0
terminal
Scenario debrief
0
Score
0
Correct
0%
Accuracy
🦹 Attack chain
🧑‍💻 Defence chain
⚡ Key lessons