Configuration

The Infection Monkey is highly configurable. Nearly every part of it can be modified to turn it into a fast-acting worm or a port scanning and system information collecting machine.

ūüďė

Incomplete documentation

This section of the documentation is incomplete and under active construction.

See these documentation pages for information on each configuration value:
Credentials: Configure credentials that the Monkey will use for propagation.
Network: Configure settings related to the Monkey's network activity.