Jump to Content
Guardicore Infection Monkey
Guide
TrainingSupportCommunityGuardicore Infection Monkey
TrainingSupportCommunity
Guide

Welcome

  • Guardicore Infection Monkey documentation hub

Setup

  • Setting up Infection Monkey
  • Windows
  • Docker
  • Linux
  • AWS
  • Azure
  • Accounts and security

Usage

  • Usage
  • Getting started
  • Scenarios
  • Ransomware simulation
  • Custom
    • Network breach
    • Network segmentation
    • Credentials leak
    • Other
  • Configuration
    • Credentials
    • Network
  • Integrations
    • Running the Agent on AWS EC2 instances
  • Verify integrity- checksums
  • Running manually
  • Malware Masquerade
  • Polymorphism
  • Cryptojacker simulation
  • Plugins

Contribute

  • Securing networks together
  • Development setup

Reference

  • Reference
  • Data directory
  • Operating Systems
  • Exploiters
    • Log4Shell
    • PowerShell
    • Zerologon
    • WMIexec
    • SSHexec
    • SMBexec
    • MSSQL
    • Hadoop
    • RDP
  • Server configuration
  • Credential collectors

Reports

  • Infection Monkey reports
  • Security report
  • Ransomware report

FAQs

  • Frequently asked questions

Infection Monkey reports

Suggest Edits

Infection Monkey offers the following reports:

  • Security report: Provides actionable recommendations and insight into an attacker's view of your network.
  • Ransomware report: Provides information about ransomware simulation on your network.

Updated 5 months ago