Need cloud computing? Get started now

Infection Monkey graphic blue background

Infection Monkey

Test and validate your defenses with Infection Monkey, our free open-source malware vaccine.

The malware vaccine

Infection Monkey is an open-source adversary emulation platform that helps you validate existing controls and identify how attackers might exploit your current network security gaps.

With real-world adversary simulation, you can see where malware can move into and across your networks. You can then use that data to strengthen your defenses and eliminate vulnerabilities.

Put your network security to the test

Infection Monkey is an open-source adversary emulator platform that helps you validate existing controls and identify how attackers might exploit your current network security gaps.

Continuous testing

Regularly run the platform to test your security strategy and specific controls.

Environment agnostic

The Monkey isn’t picky. On-premises, containers, and public and private clouds are all supported.

Actionable data

Report on your network’s performance against a broad set of attacker behaviors.

How it Works

Validate

Validate

Prove value on previous or upcoming security purchases.

Emulate

Emulate

See where malware could move laterally in your environment.

Mitigate

Mitigate

Get real-time data on where defenses could be strengthened.

Frequently Asked Questions (FAQ)

Adversary emulation is a cybersecurity defense technique which employs the tactics, techniques, and procedures (TTPs) of real attackers. An adversary emulation plan is usually completed by an actual human in advanced penetration tests or purple team exercises, which can get quite expensive and require other resources. Infection Monkey does it automatically (after configuration) and for free.

Adversary emulation (or adversary simulation) is one of many cybersecurity defense tactics out there. Defense in depth is recommended – it is meant to be used in conjunction with tactics such as pen tests or vulnerability scans.

As often as you’d like! Once you have it configured to your liking, you can run your real-world adversary emulation plan every day, if you want to. Infection Monkey is free, which means you can test for vulnerabilities without having to budget to have cybersecurity services run an adversary emulator for you.

If malware is the problem you’re defending against, it stands to reason that using safe malware to fight back would give the best gap analysis. By mimicking adversary behaviors, Infection Monkey provides real world attack scenarios that you can run whenever you want to.

Traditional vaccines work like this: inject a small amount of the virus to introduce it to your immune system. Your immune system then attacks it and learns where it doesn’t know what to do. It then adapts to fight against the infection, hopefully building enough antibodies to limit the sickness. Infection Monkey does exactly this in the cyber world, effectively fighting malware with malware.

Supported platforms

aws
Docker
Azure
Windows Server
Penguin

Download Infection Monkey for free