StackShareStackShare
Follow on
StackShare

Discover and share technology stacks from companies around the world.

Product

  • Stacks
  • Tools
  • Companies
  • Feed

Company

  • About
  • Blog
  • Contact

Legal

  • Privacy Policy
  • Terms of Service

© 2025 StackShare. All rights reserved.

API StatusChangelog
Infection Monkey
ByGuardicoreGuardicore

Infection Monkey

#115in Security
Stacks4Discussions0
Followers19
OverviewDiscussions

What is Infection Monkey?

An open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.

Infection Monkey is a tool in the Security category of a tech stack.

Key Features

Multiple propagation techniques,Predefined passwords for SSH, SMB, RDP, WMI, Common logical exploits, Shellhock,Sambacry, Password stealing using Mimikatz and ssh keysAutomated security report with reccomendations

Infection Monkey Pros & Cons

Pros of Infection Monkey

  • ✓Simple automated tool to automate basic security tests

Cons of Infection Monkey

No cons listed yet.

Infection Monkey Alternatives & Comparisons

What are some alternatives to Infection Monkey?

ZAP

ZAP

It is a free, open-source penetration testing tool. It is designed specifically for testing web applications and is both flexible and extensible.

Oneleet

Oneleet

It is a compliance-focused pentesting-as-a-service platform. It allows companies to easily schedule and manage penetration tests, designed for both compliance and security enhancement.

PentestGPT

PentestGPT

It is a penetration testing tool empowered by ChatGPT. It is designed to automate the penetration testing process. It is built on top of ChatGPT and operates in an interactive mode to guide penetration testers in both overall progress and specific operations.

PETEP

PETEP

It is an open-source Java application for network communication proxying for the purpose of penetration testing. It allows penetration testers to set up proxies and interceptors to manage the traffic transmitted between client and server.

Try It

Visit Website

Adoption

On StackShare

Companies
1
F
Developers
4
DAV6