Exploiters

Infection Monkey uses various RCE exploiters. Most of these, in our knowledge, pose no risk to performance or services on victim machines. This documentation serves as a quick introduction to the exploiters currently implemented and vulnerabilities used by them.

You can check out the Exploiters’ implementation yourself in the Monkey’s GitHub repository.