Put your network security to the test
Infection Monkey is an open-source adversary emulator platform that helps you validate existing controls and identify how attackers might exploit your current network security gaps.
How it works
Frequently Asked Questions (FAQ)
Frequently Asked Questions (FAQ)
Adversary emulation (or adversary simulation) is one of many cybersecurity defense tactics. Defense in depth is recommended — it is meant to be used in conjunction with tactics such as pen tests or vulnerability scans.
Run the Monkey as often as you’d like! Once you have it configured to your liking, you can run your real-world adversary emulation plan every day, if you want to. Infection Monkey is free, which means you can test for vulnerabilities without having to budget to have cybersecurity services run an adversary emulator for you.
If malware is the problem you’re defending against, it stands to reason that using (safe) malware to fight back would give the best gap analysis. By mimicking adversary behaviors, Infection Monkey provides real-world attack scenarios that you can run whenever you want to.
Traditional vaccines work like this: Inject a small amount of the virus to introduce it to your immune system. Your immune system then attacks it, and learns when it doesn’t know what to do. It then adapts to fight against the infection, ideally building enough antibodies to limit the sickness. Infection Monkey does exactly this in the cyber world, essentially fighting malware with malware.