# Attack Types

- [Data Entry Attack](/guides/attack-simulations/attack-types/data-entry-attack.md)
- [Hyperlink Attack](/guides/attack-simulations/attack-types/hyperlink-attack.md)
- [File Attack](/guides/attack-simulations/attack-types/file-attack.md)
- [Portable Media](/guides/attack-simulations/attack-types/portable-media.md)
- [Smishing](/guides/attack-simulations/attack-types/smishing.md)
- [Lures](/guides/attack-simulations/attack-types/lures.md)
- [QR Codes](/guides/attack-simulations/attack-types/qr-codes.md)
- [Ransomware Emulation](/guides/attack-simulations/attack-types/ransomware-emulation.md)
- [Technical Malware Test](/guides/attack-simulations/attack-types/technical-malware-test.md)
- [Malware Toolkit Test Suite](/guides/attack-simulations/attack-types/technical-malware-test/malware-toolkit-test-suite.md): The Toolkit tests if the target system is vulnerable to miscellaneous malware technologies.
- [Mail & Web Filter Test](/guides/attack-simulations/attack-types/mail-and-web-filter-test.md)
- [Email Spoofing Test](/guides/attack-simulations/attack-types/email-spoofing-test.md)
