Tool and Usage
|Latest release||1.6.3 |
Why this tool?
This tool is useful for security assessments to test for weaknesses within the network. By automating the exploitation phase as much as possible, it will help finding any weak targets within the boundaries of the data center.
How it works
The toolkit exists of two components. Monkey and Monkey Island. The first is a tool with the goal to infect or brach other systems and propagate to them. Monkey Island is a dedicated server to control and visualize the progress of the Infection Monkey.
Usage and audience
Infection Monkey is commonly used for service exploitation or system exploitation. Target users for this tool are pentesters and security professionals.
- Web interface
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + More than 10 contributors
- + More than 500 GitHub stars
- + The source code of this software is available
Supported operating systems
Infection Monkey is known to work on Linux and Microsoft Windows.
Infection Monkey alternatives
Similar tools to Infection Monkey:
Arpag is a security tool to perform automatic exploiting of targets. It can be instructed to scan a set of ports and based on the outcome, it will search and active a related exploit.
AutoSploit is short for automatic exploitation. The open source tool helps pentesters and ethical hackers. Read this review on see how it works.
Leviathan is a security tool to provide a wide range of services including service discovery, brute force, SQL injection detection, and exploit capabilities.
This tool page was updated at . Found an improvement? Help the community by submitting an update.