SES — Social Engineering Simulator

Dark green grunge background

SES (Social Engineering Simulator) is a project I developed to explore how adversaries use behavioral techniques to gain unauthorized access or influence decisions. The simulator models phishing, pretexting, and impersonation scenarios and allows for repeatable experiments to measure human responses across different cues, levels of urgency, and trust signals. The goal is to provide measurable training and defensible analyses that support improved user awareness and technical controls.

Technically, SES is built as a lightweight web application with modular scenario definitions and analytics. It collects anonymized signals about user choices and responses (when ethically and legally permitted) so that administrators can compare training vectors and prioritize mitigations. SES demonstrates how combining UX, measurement, and clear reporting can create useful training programs that produce measurable improvements in organizational security posture.

Live demo: https://ses-tau.vercel.app/
Repository: github.com/jakegallegos2047-sudo

Other projects & notes

Beyond SES, I maintain smaller utilities and writeups that document penetration testing exercises, secure coding patterns, and defensive checks. Examples include scripts for automating reconnaissance tasks (used in controlled labs), sample playbooks for incident response, and short technical write-ups explaining how to interpret logs and trace attack sequences. Each item in my repository includes a short README and notes on safe replication in lab environments.

Where possible, I favor tools and writeups that are reproducible, well-documented, and designed to be reused by educators and security teams.