Welcome to our phishing simulation platform. This guide provides a clear and practical overview of the product’s main features and explains how to design and launch a complete phishing simulation campaign, from preparation to reporting.
This platform is a phishing simulation framework designed to make attack testing realistic and accessible. Built on an open-source foundation, it features an improved user interface and enterprise-ready infrastructure: scenario creation, target management, SMTP delivery, directory integrations, and automated results tracking.
To use the platform, you need:
If you have external antispam protections, whitelist the recommended sending IP addresses (e.g., 185.163.125.9, 45.13.104.11).
Domain: whitelisting.gottaphish.com
After your account is created, open a browser and go to: https://<your-subdomain>.yourplatform.com. Credentials (username and password) are provided by email at onboarding.
The Account & Settings panel centralizes the instance configuration: language, API key management (can be reset), and access to documentation. To change your password, go to Manage your account.
Two billing models exist:
The organization dashboard shows quota usage and target consumption. MSSPs can enable license sharing between clients.
For MSSPs, the Clients section lets you add and manage customers (logo, billing type, domains, quotas). You can also add phishing domains:
The Phishing DNS Toolkit suggests domain names suitable for phishing simulations.
Admins can create user accounts with distinct credentials, enabling delegation of campaign operations and separation of responsibilities.
Available integration types:
Click Install to enable Microsoft user integration. A modal will let you enable user/group sync, then you’ll be redirected to Microsoft for authorizations.
To whitelist SMTP with MS you can do it via : https://security.microsoft.com/advanceddelivery?viewid=PhishingSimulation
Enable Google integration by creating an application in the Google Admin Console and entering the clientId and required scopes into the platform, then install.
Webhooks provide real‑time campaign events (same JSON structure as the API). They can be signed and are created by administrators via the Webhooks section.
Domain management centralizes the names used for landing pages. You can buy new domains, add them, verify DNS records, and decide whether domains are shared or dedicated per client.
Configure how results are collected and displayed, including enabling IMAP sync to retrieve responses or bounces from a mailbox to improve report accuracy.
Complete these steps to launch your campaigns.
In the “Client Settings” section, under the “License Management” tab, check that you have the number of licenses required to launch your campaign. You can purchase licenses at any time by clicking on the “Order Licenses” button.
In order to best capture your targets, you must create or import the landing pages to which people who click on the link in your campaign email will be redirected.
From the “Environments” section, “Landing Pages” tab, click on “New Landing Page.”
You can then choose between two types of pages:
Environments represent the phishing themes or personas used in simulations — the user‑facing context and look‑and‑feel of the attack rather than low‑level infrastructure. An environment bundles the sender profile, visible UI template, wording style, and landing‑page design that together create a believable lure.
Examples:
Create one environment per phishing theme so you can reuse templates, sender addresses, and landing pages across multiple campaigns while keeping consistency and realism.
In the “Environments” section, define the company whose identity you want to spoof so that it appears as the sender of your campaign emails.
In the advanced settings, you can define
Enter its name, select or import its logo, then associate the corresponding landing page.
Also specify the domain name that will be displayed as the sender of the emails.
You can purchase new domains at any time in the “Integrations” section, under the “Domains” tab.
By default, two scenarios are automatically created for each environment. You can choose to generate 0, 1, or 2 additional scenarios per day, so you have ready-to-use scenarios for your next campaigns.
In the “Scenarios” section, create the emails that your targets will receive in their inbox.
Here you will find all your email templates, as well as those shared by the community.
Then click on create, and your email will appear in a few seconds.
Modify your email templates
By hovering over the email, you can add it to the catalog, edit it, or delete it.
By clicking on edit, you can change the name of the scenario and its description, but above all, you can access advanced customization settings.
You can also manually modify the content of the email (change a word, add a sentence, etc.), either via the visual editor or via the code editor, symbolized by this icon:

Tip: Remember — templates are case sensitive.
| Variable | Description |
|---|---|
{{.RId}} |
L’identifiant unique de la cible |
{{.RIdBasic}} |
Variante simplifiée de l’identifiant unique (sans encodage spécial, utile pour logs ou URLs custom) |
{{.FirstName}} |
Prénom de la cible |
{{.LastName}} |
Nom de la cible |
{{.Position}} |
Poste / fonction de la cible |
{{.Email}} |
Adresse e-mail de la cible |
{{.From}} |
Expéditeur usurpé affiché dans l’e-mail |
{{.URL}} |
URL phishing principale |
{{.BaseURL}} |
URL de base sans paramètres ni path (utile pour pointer vers des ressources statiques) |
{{.TrackingURL}} |
URL du tracker utilisé pour l’ouverture de l’e-mail |
{{.Tracker}} |
Alias pour intégrer l’image de tracking : <img src="{{.TrackingURL}}"/> |
{{.TrackerAttachment}} |
Nom ou chemin de la pièce jointe tracker (si utilisé) |
{{.DetailsLastScenarioService}} |
Informations détaillées sur le dernier scénario/service utilisé (ex. pour scénarios en chaîne) |
{{.LogoServiceUsed}} |
Nom du service dont le logo doit être affiché (ex. “Microsoft”, “Google”) |
{{.GTPService}} |
Nom du service associé au scénario GTP (selon votre logique interne) |
Champs hérités de BaseRecipient |
(déjà listés ci-dessus : FirstName, LastName, Position, Email, etc.) |
In the “Employees & Groups” section, create your groups by importing your employees.
Several methods are available:
You can also add an employee from the “Employees” tab and associate tags with them to refine the personalization.
In the “Campaigns” section, you will find your campaign history, with results for each campaign such as the number of emails opened, links clicked, and emails reported.
To launch your first campaign, click on “New Campaign.”
You can then:
Once the campaign is over, you can close it by sending an educational email using the green button to the left of each campaign.
This email explains to recipients that it was a phishing email and details the signs to look out for to avoid being caught out in the future.
The Reporting section collects all events: clicks, IPs, geolocation, target status, etc. IMAP sync enables fetching replies and bounces from a mailbox to improve report accuracy.
The dashboard gives an overview of activity: recent campaigns, success rates, at‑risk targets, and key metrics to drive your awareness program.