LOADING

Unleash the Infection Monkey in your network and discover security flaws in no time.

How Resilient Is Your Network to Advanced Threats?

An open source Breach and Attack Simulation tool to evaluate the security posture of your network.

Free Download

Meet The Infection Monkey

The Infection Monkey is an open source Breach and Attack Simulation (BAS) tool that assesses the resiliency of private and public cloud environments to post-breach attacks and lateral movement.

Continuous & Safe Assessments

Run the Infection Monkey around the clock to identify new security risks and to validate existing security controls as your environment changes. It is non-intrusive, with no impact on your network.

Actionable Insights for Your Security Team

CISO

Security Researcher

Provide quantifiable results at the board level on risk exposure and the effectiveness of security investments

Analyze attack simulation results to better understand weak spots in your network and prioritize risk mitigation

Support for Core Data Center and Cloud Platforms:

When Should I Run the Infection Monkey?

In a modern network you can’t afford waiting for that quarterly pentest to validate your overall security posture. To match the pace of change in dynamic environments, you need a readily available tool that automates your security testing. By deploying an ongoing testing solution you can verify the security baseline of your network and achieve full network coverage.

Application Updates

Run the Infection Monkey after every update to an application in your environment. This allows you to ensure you did not leave any windows open for attackers and to validate security controls

Continuous Security Validation

Using the Infection Monkey continuously, and between normally scheduled pentests, helps ensure your security controls are in place, configured properly and able to detect and block a real-world attack.

Evaluate your security posture in 3 Easy Steps

Test how well your security controls work and get actionable recommendations.

A New Approach to Security Assessments

The Infection Monkey operates in much the same way a real attacker would - starting from a random location in the network and propagating from there, while looking for all possible paths of exploitation.

The Infection Monkey is a Friend

The Infection Monkey is 100% safe and reliable, with low CPU and memory usage consumption. All attack simulations are constantly tested to ensure they're stable and pose no danger.

A Lot of Value Packed into a Single Package

In-depth testing

Simulates post breach lateral movement

Generate a report

A comprehensive, detailed security findings report

Visualize attacker moves

Network map from the attacker's point of view

Free Download

Please fill out this form to receive an email with a link to the Infection Monkey package/image.

About GuardiCore Labs

The Infection Monkey is developed and maintained by GuardiCore Labs, the GuardiCore global research team, consisting of hackers, cybersecurity researchers and industry experts. Our mission is to deliver cutting-edge cyber security research and provide analysis, insights and response methodologies to latest cyber threats. We help GuardiCore customers and the security community to continually enhance their security posture and protect critical business applications and infrastructure.

Visit GuardiCore Labs

Get involved

Community

Getting Started

I Got an Upgrade

I’m even better than before!

Version 1.6 is now out and ready to run

The Infection Monkey gained a few new capabilities:

  • Detect cached credentials that allow attackers to spread to critical servers
  • Identify the risk of unpatched servers in your environment
  • Test your network segmentation

Automatic Attack Simulation

Simply infect a random machine with the Infection Monkey and automatically discover your security risks. Test for different scenarios - credential theft, compromised machines and other security flaws.

Continuous & Safe Assessments

Run the Infection Monkey around the clock to identify new security risks and to validate existing security controls as your environment changes. It is non-intrusive, with no impact on your network.

Actionable Recommendations

The Infection Monkey assessment produces a detailed report with remediation tips, including a visual map of your network from an attacker’s point of view to actively secure your network.

Free
Security testing at no additional costs

In-depth testing
Simulates post breach lateral movement

Environment agnostic
Supports containers, public and private clouds

Open Source
Developed under the GPL v3 open source license

Generate a report
A comprehensive, detailed security findings report

Easy to deploy
Ready made installer for every environment

Visualize attacker moves
Network map from the attacker's point of view

Scalable
Automatically Handles network regardless of size

Continuous
Ongoing network-wide security testing

Free
Security testing at no additional costs

In-depth testing
Simulates post breach lateral movement

Environment agnostic
Supports containers, public and private clouds

Easy to deploy
Ready made installer for every environment

Open Source
Developed under the GPL v3 open source license

Generate a report
A comprehensive, detailed security findings report

Continuous
Ongoing network-wide security testing

Visualize attacker moves
Network map from the attacker's point of view

Scalable
Automatically Handles network regardless of size

How

Resilient

Is Your

Network?

The Infection Monkey is a Friend