- Home
- Human Risk
- Phishing Simulation
- Swordphish
Swordphish
A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.

Swordphish
A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.

Founder & Fractional CISO
Not sure if Swordphish is right for your team?
Book a 60-minute strategy call with Nikoloz. You will get a clear roadmap to evaluate products and make a decision.
→Align tool selection with your actual business goals
→Right-sized for your stage (not enterprise bloat)
→Not 47 options, exactly 3 that fit your needs
→Stop researching, start deciding
→Questions that reveal if the tool actually works
→Most companies never ask these
→The costs vendors hide in contracts
→How to uncover real Total Cost of Ownerhship before signing
Swordphish Description
Swordphish is a platform allowing to create and manage fake phishing campaigns. Identifying security contacts may be hard in a big structure, that's why we developed Swordphish and a button embedded in the mail client to help our users to report suspicious mail to security teams just with a simple click. This choice seriously improved our visibility on what our users are receiving, and we decided to release it to the community! Swordphish can be used to train people identifying suspicious mails, and it can help checking that people report correctly the mails to security teams. Installation Detailed installation instructions can be found in the documentation. Docker images Swordphish has a docker-compose script to get up and running quickly.
Swordphish FAQ
Common questions about Swordphish including features, pricing, alternatives, and user reviews.
Swordphish is A platform for creating and managing fake phishing campaigns to raise awareness and train users to identify suspicious emails.. It is a Human Risk solution designed to help security teams with Incident Response, Phishing, Security Training.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox