Safe exploiters

The Infection Monkey uses safe exploiters and does not cause any permanent system modifications that could impact security or operations.

The Infection Monkey is a versatile breach and attack simulation tool. It allows you to configure the simulation according to your needs. You can enhance, optimize, and fine-tune the Monkey's behavior.

Section contents

Here are some examples with instructions on how to configure them:

Ransomware Simulation: Simulate a ransomware attack on your network and assess the potential damage.
Custom: Configure a custom scenario to test your network's defenses.