// THE FALSE BOTTOM
The world's most advanced phishing detection training platform.
Learn to spot deception hiding beneath every email, call, and link.
Everything you need to become a human firewall.
5 real-world phishing scenarios with X-Ray email analysis. Earn your Security IQ.
Phish or Legit, URL Detective, Attack Quiz, Social Engineering Survival.
Deep-dive into 8 attack vectors with real-world examples and red flags.
Generate personalized phishing attacks for any role. No API key needed.
8 distinct attack vectors that compromise millions every year. Click any to explore in depth.
Fraudulent calls impersonating IRS, banks & tech support to steal credentials in real time.
Malicious texts mimicking banks, couriers & services with lookalike URLs.
Silently redirects correct URLs to malicious copycat sites via DNS hijacking.
Malicious QR codes in public places & emails that bypass link scanners.
Exact replicas of real emails you've received โ same content, same sender look, but all links replaced with malicious ones.
Fake Wi-Fi hotspot intercepts all traffic via man-in-the-middle attack.
Fake support accounts on social media targeting users who complain.
The most sophisticated & fastest-growing attack vector. AI-cloned voice or video of your CEO orders wire transfers, credential resets, and system access โ in real time.
Enter credentials to continue
New agent? Create account
Your cybersecurity training command centre
5-scenario quiz. Earn your Security IQ.
4 security games. Earn points.
Deep-dive into all 8 attack types.
See your global ranking live.
๐ก Hover over sender & links to use X-Ray, then decide:
Sharpen your cyber instincts โ each game earns points on the leaderboard.
10 emails flash by โ judge each as phishing or legitimate. Race against the clock!
Pick the malicious URL from a pair of look-alikes. 8 rounds with speed bonus!
Read a scenario and name the attack โ vishing, smishing, pharming, and more!
Navigate real social engineering scenarios. One wrong move and you're compromised!
Which URL is FAKE / MALICIOUS?
What type of attack is this?
What do you do?
Eight distinct phishing attack vectors โ each with detailed breakdowns, real-world examples, red flags, and visual simulations.
Practical countermeasures every person and organization should implement today.
Multi-factor authentication stops 99.9% of automated attacks even if your password is stolen.
Always hover over links to preview the real destination URL before clicking anything in an email.
If a call or message requests urgent action, hang up and call back using a number you look up independently.
Look for padlock icons and verify exact domain spelling. Attackers use subtle typos like paypai.com.
Preview QR destinations before opening. Be especially skeptical of QR codes in public places.
Create a safe word with executives and finance teams to verify identity during unusual requests โ especially for wire transfers.
Generate personalized phishing attacks for any role using AI. X-Ray mode enabled on all links.
Rankings from quiz & game performance โ updates live
Complete the Quiz to earn your global rank. Game points add bonus XP.
Paste a suspicious email for instant AI threat analysis.