Configuration

The Infection Monkey is highly configurable. Nearly every part of it can be modified to turn it into a fast-acting worm or a port scanning and system information collecting machine.

📘

Incomplete documentation

This section of the documentation is incomplete and under active construction.

See these documentation pages for information on each configuration value:
Credentials: Configure credentials that the Monkey will use for propagation.
Network: Configure settings related to the Monkey's network activity.