The Industry’s 1st Zero Trust Assessment Tool

Never Trust, Always Verify
with Guardicore Infection Monkey

Meet the Infection Monkey

Now with Zero Trust!

The Infection Monkey is an open source Breach and Attack Simulation (BAS) tool that tests your network against the Forrester Zero Trust framework and provides a report with actionable data and recommendations to help you make Zero Trust decisions.

Zero Trust Report

The Infection Monkey is now powered by Zero Trust testing capabilities. It tests your network’s adherence to the components of Forrester Zero Trust framework and generates a free status report with actionable recommendations to help you prioritize your Zero Trust decisions.

Infection Monkey Zero Trust Use Cases

  • Test your network after every step you take toward a Zero Trust architecture
  • Identify the areas you need to focus on in your journey to Zero Trust
  • Verify your security tools meet Zero Trust requirements

Learn More

Evaluate Your Zero Trust Posture in 3 Quick Steps

Support for Core Data Center and Cloud Platforms:

Download the Infection Monkey for Zero Trust for Free

Please fill out this form to receive an email with a link to the Infection Monkey for Zero Trust package/image.

About Guardicore Labs

The Infection Monkey is developed and maintained by Guardicore Labs, the Guardicore global research team, consisting of hackers, cybersecurity researchers and industry experts. Our mission is to deliver cutting-edge cyber security research and provide analysis, insights and response methodologies to latest cyber threats. We help Guardicore customers and the security community to continually enhance their security posture and protect critical business applications and infrastructure.

Visit Guardicore Labs

Step 1


Run the Infection Monkey from one or multiple machines on any platform of your choosing

Whether it’s a public cloud instance or on-premises server. The Monkey will then run different tests to evaluate your network alignment to the Zero Trust framework such as whether you have applied segmentation, user identity, encryption and more.

Step 2

Sit back

Sit back and let the Monkey test your network.

The  Monkey tests the adherence of your product to the Zero Trust framework components in the areas of network, people, devices,workloads, data, orchestration and visibility.

Step 3


Act on the Monkey's findings and recommendations.

The Monkey generates a comprehensive report detailing your adherence to the pillars of Zero Trust, including detailed explanations of where the enterprise falls short, and instructions on how to address these shortcomings.