Infection Monkey

LSE top 100LSE top 100Infection Monkey (43)Infection Monkey (43)

Tool and Usage

Project details

Programming language
Latest release
Latest release date

Project health

This score is calculated by different factors, like project age, last release date, etc.

Why this tool?

This tool is useful for security assessments to test for weaknesses within the network. By automating the exploitation phase as much as possible, it will help finding any weak targets within the boundaries of the data center.

How it works

The toolkit exists of two components. Monkey and Monkey Island. The first is a tool with the goal to infect or brach other systems and propagate to them. Monkey Island is a dedicated server to control and visualize the progress of the Infection Monkey.

Usage and audience

Infection Monkey is commonly used for password discovery, service exploitation, or system exploitation. Target users for this tool are pentesters and security professionals.


  • Web interface

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:


  • + More than 25 contributors
  • + More than 5000 GitHub stars
  • + The source code of this software is available

Author and Maintainers

Supporting company

This project is maintained by Guardicore Ltd


Supported operating systems

Infection Monkey is known to work on Linux and Microsoft Windows.

Infection Monkey alternatives

Similar tools to Infection Monkey:



AutoSploit is short for automatic exploitation. The open source tool helps pentesters and ethical hackers. Read this review on see how it works.


Leviathan Framework

Leviathan is a security tool to provide a wide range of services including service discovery, brute force, SQL injection detection, and exploit capabilities.



Arpag is a security tool to perform automatic exploiting of targets. It can be instructed to scan a set of ports and based on the outcome, it will search and active a related exploit.

All Infection Monkey alternatives

This tool page was updated at . Found an improvement? Help the community by submitting an update.

Related tool information


This tool is categorized as a automatic exploitation tool and security automation tool.