Your E-Learning Platform for Cyber Attack Training


  • null
  • null
  • null
  • null


    • Spear phishing simulations
    • SMS & portable media attacks
    • File attacks (PDF, Java, Macro, etc.)
    • Website cloner
  • null


    • Interactive online & offline training content
    • Customizable e-learning movies
    • Role and Reputation-based training
    • Integrated LMS with SCORM export/import
  • null


    • Mail Plugin (Outlook, Gmail, O365, etc.)
    • E-mail Incident Analysis
    • E-mail Threat Mitigation
  • null


    • Exposure to malware attacks
    • Detection of browser vulnerabilities
    • Spoofing & Ransomware simulation
    • Mail and Web filter tests

Lucy in a nutshell: How to download, run & update lucy?



  • Amazon Image (AMI)
  • Linux Installer
  • VMware/Virtual Box Image
  • Hyper-V Image



  • Install on Premise
  • Install in cloud
  • Run on our VPS
  • Run as SaaS



  • Automatic template updates
  • Latest E-Learning content
  • Regular software updates



  • Live remote support plug-in
  • Campaign health checks
  • Automated DNS & SSL setup
  • Support ticketing system


Would your employees react correctly to hacker attacks?

With a variety of predefined, multilingual attack simulations (phishing, malware, smishing, USB attacks, etc.) you can test whether your employees are really familiar with the dangers of the Internet. LUCY provides a “safe learning environment” where employees can experience what real attacks would feel like. LUCY enables you to simulate the full threat landscape that goes beyond just simple phishing emails:

  • Ransomware simulations;
  • Portable Media Attacks (USB, CD, etc.);
  • Malware Simulations (Office macros, Java, etc.);
  • File-Based Attacks (PDF, Audio, etc.);
  • Spoofing Attacks (Website Cloner, SMS & Mail spoofing)
  • …and many more


Close knowledge gaps with Lucy’s E-Learning

LUCY offers more than 300 interactive, web-based Training Modules (videos, tests, quizzes, games, etc.) on various security topics that can be provided to employees based on the results of the attack simulations or independently of them. Employees can manage their own learning content in the LUCY LMS while your IT Administrator tracks their learning progress in real time. An integrated authoring tool allows you to quickly create new learning content, and Lucy can create custom content for you, as well.

  • 300+ WBT training modules
  • Role- and reputation-based training
  • End user training portal access
  • E-Learning education diploma
  • Measure training success
  • E-Learning content authoring toolkit
  • Static training library
  • Offsite support
  • Video customization options
  • Training content SCORM import/export
  • …and many more


Turn your employees into human firewalls

The LUCY Mail Plugin for Gmail, Outlook & Office365 actively integrates your employees into the detection of and fight against cyber attacks. Suspicious e-mails can be reported with just one click and removed from the Inbox. In the LUCY environment the e-mails are then analyzed and evaluated. Automatic feedback gives the user the risk score. If the suspect e-mail is a real attack, it can be reported to the responsible provider with the Threat Mitigator.

  • Report Emails with a single click
  • Deep inspection request
  • Automatic Incident Analysis
  • Incident Auto Feedback
  • Threat Mitigation
  • Custom rule-based analysis
  • Plugin customisation options
  • Third party integration
  • Identify attacks with common patterns
  • Incident user reputation profiles
  • …and many more


With the use of phishing simulation you now know that X% of your employees downloaded and executed an unknown file. But from a technical point of view, what kind of dangerous file types can get to the employee and how big is the risk if such a file is actually executed?

The E-mail and Internet malware protection test gives you an insight into how your mail server and web proxy handle different variations of test files. This allows you to see whether potential malicious code, such as Java files, backdoors, scripts, embedded Office Objects, etc., is detected and blocked by the filter infrastructure. Based on these results, you can then carry out targeted phishing campaigns.

To reduce the risk from malware in your environment, you need safe and effective ways to test your systems. This is where LUCY’s Malware Simulation Toolkit (LHFC) comes into play. LHFC is an advanced malware simulation suite capable of emulating various threat scenarios equivalent to many of the tools that hackers employ. The local Windows test (LHFC) will let you know if your defenses work in case an employee executes a malicious file.

  • Does your AV detect known Malware downloads?
  • Is your SIEM able to trigger activities from this tool?
  • Is Malware able to modify System Settings?
  • Is Malware able to communicate to external servers?
  • Can Malware access sensitive data on the local host or your intranet?
  • What type of file types can be sent as attachments to the end user?
  • What type of file types can be downloaded from a website by the user?
  • Does your internet and mail protection software detect potential malware?
  • Does your internet and mail protection software detect masked malware?
  • …and many more


Monitor attack statistics and eLearning progress in real-time! Track all attack simulation statistics like the number of emails that were opened, how many links were clicked, and how many attacks were successful. Measure your eLearning progress with training stats and quiz results. You can then easily export your data as CSV, API, PDF, HTML, or DOCX.

  • Export Features
  • Bounce and Out-of-Office Reporting
  • Landing Page Time Tracking
  • Comprehensive Reporting
  • Comparison
  • Benchmark
  • Realtime Dashboard
  • Business Intelligence
  • Advanced Video tracking
  • Multi-tenant view-only access
  • Advanced Quiz tracking
  • Support for anonymization and data protection


  • Reminders

  • Response detection

  • Full mail communication client

  • Scheduler Randomization

  • Performance tools

  • Multilingual admin interface

  • Certificate (SSL)

  • Role-based access controls

  • Multi-layered user groups

  • Multi-client compatible

  • Campaign templates

  • Setup wizard with risk-based guidance

  • Campaign checks

  • Approval workflows


  • null



    Reminder templates can be used to automatically resend messages to users who have not clicked on an attack link or a training course after a custom period of time.

  • null


    Response detection

    The automatic response detection makes it possible to define and analyze automatic e-mail responses (e.g., out of office) as well as mail delivery errors (e.g., user unknown) within the campaign.

  • null


    Full mail communication client

    A built-in messaging platform allows the LUCY admin to communicate interactively with the recipients inside or outside the LUCY campaigns. All e-mails are archived and can be evaluated.

  • null


    Scheduler Randomization

    Raising employee awareness at random is the key factor for effective and sustainable awareness within the organization. Randomly sending many concurrent campaigns is one of the best means of training employees.

  • null


    Performance tools

    LUCY smart routines adapt the server installation to the given resources. Applications Server, DBMS Sizing, Memory and CPU usages are calculated during installation or during operations. You can scale a single, cloud-based LUCY installation for 400,000+ users.

  • null


    Multilingual admin interface

    The LUCY admin interface is available in different languages and can be translated into other languages on request.

  • null


    Certificate (SSL)

    Allows the automatic creation of official and trusted certificates for the admin, backend as well as for the campaigns. LUCY will automatically use the domain configured in the system to generate the certificate. If you decide to use SSL for the campaign, you can generate a custom certificate or a CSR (Certificate Signing Request). You can also import official trusted certificates.

  • null


    Role-based access controls

    LUCY offers a role-based access control (RBAC) that restricts system access to authorized users only. The permissions to perform certain operations are assigned to specific roles within the user settings. Members or staff (or other system users) are assigned particular roles through which to acquire the necessary computer permissions to perform particular LUCY functions.

  • null


    Multi-layered user groups

    Quickly upload users in bulk via a CSV, LDAP, or text file. Create different groups, organized by department, division, title, etc. Update users in a running campaign. Build dynamic user groups based on the phishing campaign results.

  • null


    Multi-client compatible

    “Clients” can refer to different companies, departments, or groups that have an associated campaign in LUCY. These clients can be used, for example, to allow campaign-specific access or to create customer-specific analysis.

  • null


    Campaign templates

    In case you want to reuse similar campaigns, you can save a complete campaign with attack templates and eLearning content as a campaign template. This feature allows you to evade having to repeat similar configurations over and over again.

  • null


    Setup wizard with risk-based guidance

    LUCY offers several Setup Tools. Create a complete campaign in less than 3 minutes using the predefined campaign templates or let the Setup Wizard guide you through the configuration. Optionally, a risk-based setup mode is available, which makes specific suggestions for the selection of attack and awareness templates based on the company’s size and industry.

  • null


    Campaign checks

    Preliminary checks before starting a LUCY campaign: E-Mail Delivery Check, MX Record Check, Schedule Check, Spam Check, and others.

  • null


    Approval workflows

    A given campaign can be submitted to a supervisor in LUCY for approval.

  • null



    The DNS API allows the administrator to create any domain on LUCY within seconds. Since attackers very often use similar spellings of a customer’s domain (called Typosquatting), this risk can also be represented in LUCY. If the customer’s original domain is, for example, “”, the DNS wizard could be used to reserve domains such as “”, “” or “” and assign it to a campaign later. LUCY then automatically creates the corresponding DNS entries (MX, SPF, Whois Protection etc) for the IP where LUCY is installed. Of course, the admin can also use his provider’s own domains in LUCY. More info (WIKI)

in our

in our