Find weaknesses in on-premises and cloud-based data centers
Choose a machine to start from and run the Monkey.
Sit back and let the Monkey pentest your network.
Act on the Monkey’s report recommendations.
The Monkey is used in some of the largest enterprises down to the smallest organizations and was tested by more than 100 companies with over 5000 servers.
In cyberspace and in cyber warfare exploitation, attacks succeed because they locate and leverage the weak points in systems and networks. In order to defend from this type of attack cycle, it is necessary to continually test the system for those likely weak points. Infection Monkey is one of the most well-aligned tools that fits this need. I’m a huge fan.
If Equifax had run the simulator prior to its breach, it would have found the unpatched server since the relevant Struts exploit is included within the Monkey’s armory.
Its capabilities are on par with or better than many of the proprietary solutions available.
Guardicore demonstrates great insight for zero trust security by offering a unique, open source tool that addresses market demand. As a no-cost, highly effective solution, Infection Monkey is a disruptive force that will likely push the competition to new levels of performance.
Security testing at no additional costs
Simulates post breach lateral movement
Supports containers, public and private clouds
Developed under the GPL v3 open source license
ZT, ATT&CK MITRE and Breach & Attack Simulation
Ready made installer for every environment
Ongoing network-wide security
testing
Network map from the attacker's point of view
Automatically Handles network regardless of size