# Attack Simulations

- [Attack Types](/guides/attack-simulations/attack-types.md)
- [Data Entry Attack](/guides/attack-simulations/attack-types/data-entry-attack.md)
- [Hyperlink Attack](/guides/attack-simulations/attack-types/hyperlink-attack.md)
- [File Attack](/guides/attack-simulations/attack-types/file-attack.md)
- [Portable Media](/guides/attack-simulations/attack-types/portable-media.md)
- [Smishing](/guides/attack-simulations/attack-types/smishing.md)
- [Lures](/guides/attack-simulations/attack-types/lures.md)
- [QR Codes](/guides/attack-simulations/attack-types/qr-codes.md)
- [Ransomware Emulation](/guides/attack-simulations/attack-types/ransomware-emulation.md)
- [Technical Malware Test](/guides/attack-simulations/attack-types/technical-malware-test.md)
- [Malware Toolkit Test Suite](/guides/attack-simulations/attack-types/technical-malware-test/malware-toolkit-test-suite.md): The Toolkit tests if the target system is vulnerable to miscellaneous malware technologies.
- [Mail & Web Filter Test](/guides/attack-simulations/attack-types/mail-and-web-filter-test.md)
- [Email Spoofing Test](/guides/attack-simulations/attack-types/email-spoofing-test.md)
- [Attack Template Customization](/guides/attack-simulations/attack-template-customization.md)
- [Firewall Protection Interval](/guides/attack-simulations/firewall-protection-interval.md)
- [Email Tracking Technologies](/guides/attack-simulations/email-tracking-technologies.md)
- [Advanced Information Gathering](/guides/attack-simulations/advanced-information-gathering.md)
- [Regular Expressions in Login Fields](/guides/attack-simulations/regular-expressions-in-login-fields.md)
- [Copy a Website](/guides/attack-simulations/copy-a-website.md)
- [Redirecting Users](/guides/attack-simulations/redirecting-users.md)
