Jump to Content
Guardicore Infection Monkey
Guide
Guardicore Infection Monkey
Guide
Guide
All
Pages
Start typing to search…

Welcome

  • Guardicore Infection Monkey documentation hub

Setup

  • Setting up Infection Monkey
  • Windows
  • Docker
  • Linux
  • AWS
  • Azure
  • Accounts and security

Usage

  • Usage
  • Getting started
  • Scenarios
  • Ransomware simulation
  • Custom
    • Network breach
    • Network segmentation
    • Credentials leak
    • Other
  • Configuration
    • Credentials
    • Importing and exporting configurations
    • Network
  • Integrations
    • Running the Agent on AWS EC2 instances
  • Verify integrity- checksums
  • Running manually
  • Malware Masquerade
  • Polymorphism
  • Cryptojacker simulation
  • Plugins

Reference

  • Logs
  • Reference
  • Data directory
  • Operating Systems
  • Exploiters
    • Log4Shell
    • PowerShell
    • Zerologon
    • WMIexec
    • SSHexec
    • SMBexec
    • MSSQL
    • Hadoop
    • RDP
  • Server configuration
  • Credential collectors
  • System requirements

Tutorials

  • Hello Monkey
  • Ransomware
  • First steps

how-tos

  • Factory reset
  • Download logs

Contribute

  • Securing networks together
  • Development setup

Reports

  • Infection Monkey reports
  • Security report
  • Ransomware report

FAQs

  • Frequently asked questions
  1. Usage

Integrations

The Infection Monkey likes working together! See these documentation pages for information on each integration the Infection Monkey currently offers:
Running the monkey on AWS EC2 instances: Use AWS SSM to execute Infection Monkey on your AWS instances.

Updated 19 days ago


Network
Running the Agent on AWS EC2 instances
Legal & privacy Cookie settings Akamai Status
Community Training Control Center Cloud Manager

© 2026 Akamai Technologies

Akamai TechDocs
Akamai.com
Linode.com
Contact us
Akamai support Linode support Share feedback
Try Akamai
Log in
Log out
Try Akamai

Akamai.com

Linode.com

Contact us Akamai support Linode support Share feedback

Log in
Log out