This section describes possible use cases for the Infection Monkey and how you can configure the tool. You can also refer to our FAQ for more specific questions and answers.
Don’t worry! The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations.
See where you stand in your Zero Trust journey.
Assess your network security detection and prevention capabilities.
Simulate an internal network breach and assess the potential impact.
Verify your network is properly segmented.
Assess the impact of a successful phishing attack, insider threat, or other form of credentials leak.
Tips and tricks about configuring Monkeys for your needs.