{"id":13483450,"url":"https://github.com/guardicore/monkey","last_synced_at":"2025-05-12T20:48:26.965Z","repository":{"id":37444320,"uuid":"41620215","full_name":"guardicore/monkey","owner":"guardicore","description":"Infection Monkey - An open-source adversary emulation platform","archived":false,"fork":false,"pushed_at":"2025-05-01T13:34:05.000Z","size":91935,"stargazers_count":6783,"open_issues_count":236,"forks_count":798,"subscribers_count":236,"default_branch":"develop","last_synced_at":"2025-05-01T14:38:03.406Z","etag":null,"topics":["adversary-emulation","infection-monkey","penetration-testing","security-automation","security-tools"],"latest_commit_sha":null,"homepage":"https://www.guardicore.com/infectionmonkey/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/guardicore.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2015-08-30T07:22:51.000Z","updated_at":"2025-04-30T22:38:46.000Z","dependencies_parsed_at":"2023-10-21T11:39:05.791Z","dependency_job_id":"64a6acd6-e993-484c-90aa-c3a2b09556ff","html_url":"https://github.com/guardicore/monkey","commit_stats":null,"previous_names":[],"tags_count":25,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/guardicore%2Fmonkey","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/guardicore%2Fmonkey/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/guardicore%2Fmonkey/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/guardicore%2Fmonkey/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/guardicore","download_url":"https://codeload.github.com/guardicore/monkey/tar.gz/refs/heads/develop","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":253819888,"owners_count":21969438,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["adversary-emulation","infection-monkey","penetration-testing","security-automation","security-tools"],"created_at":"2024-07-31T17:01:11.367Z","updated_at":"2025-05-12T20:48:26.944Z","avatar_url":"https://github.com/guardicore.png","language":"Python","readme":"# Infection Monkey\n[![GitHub release (latest by date)](https://img.shields.io/github/v/release/guardicore/monkey)](https://github.com/guardicore/monkey/releases)\n\n[![Build Status](https://app.travis-ci.com/guardicore/monkey.svg?branch=develop)](https://app.travis-ci.com/guardicore/monkey)\n[![codecov](https://codecov.io/gh/guardicore/monkey/branch/develop/graph/badge.svg)](https://codecov.io/gh/guardicore/monkey)\n\n![GitHub stars](https://img.shields.io/github/stars/guardicore/monkey)\n![GitHub commit activity](https://img.shields.io/github/commit-activity/m/guardicore/monkey)\n\nWelcome to Infection Monkey!  We're glad you could swing by.🐒 Here's all the\ninfo you'll need to start monkeying around.\n\n## What is Infection Monkey?\nInfection Monkey is an open-source adversary emulation platform that helps you\nimprove your security posture using empirical data. The Monkey uses various\nmethods to self-propagate across a network and reports its activities to a\ncentralized command and control server known as the Monkey Island. 🐵🏝️ You\nknow, like malware, but ✨safe.✨\n\n## How does it work?\n\nInfection Monkey is comprised of two components:\n\n* **Agent** - A configurable network worm that can infect machines, steal\n  data, and deliver payloads.\n* **Monkey Island** - A command and control server used to control and\n  visualize Infection Monkey's progress throughout the simulation.\n\n### Build up your malware antibodies 💉\n\n![Malware Vaccine](docs/static/images/monkey-iv.png \"Malware Vaccine\")\n\nYou can think of Infection Monkey as a kind of \"malware vaccine.\" Prior to the\ninvention of mRNA vaccines, biological vaccines worked as follows:\n\n1. Collect a sample of the virus.\n2. Through the magic of chemistry, create a weakened or inert form of the\n   virus.\n3. Inject the weakened virus into the human body, allowing the immune system to\n   build up a defense.\n\nOnce the immune system has built up a defense, it can recognize and fight off\nthe real pathogen if it should ever infect the body.\n\n**Infection Monkey aims to use this same approach to combat computer viruses\n(or other types of malware.)**\n\n1. Collect a sample of the malware.\n2. Analyze the malware and understand its behaviors.\n3. Modify Infection Monkey's configuration to enable behaviors that closely\n   mimic those of the malware, but without causing damage to the target\n   systems.\n4. Inject the Monkey Agent into the network and validate (empirically) that\n   your security controls can detect, prevent, or otherwise mitigate the\n   infection.\n5. If the infection is not successfully thwarted, take the necessary steps to\n   \"build up your immune response\" by improving your security tools, policies,\n   and processes.\n\nSun Tzu said, \"if you know others and know yourself, you will not be imperiled\nin a hundred battles.\" Knowledge of both your adversary's tactics and your own\ndefensive capabilities is necessary in order to successfully secure a network.\nInfection Monkey aims helps you to know both.\n\nBe the chimpion of your network. Learn more about the Monkey at\n[akamai.com/infectionmonkey](https://www.akamai.com/infectionmonkey).\n\n\n## Screenshots\n\n### Infection Map\n\u003cimg src=\"docs/static/images/island/infection-map-page/infection-map.png\"\u003e\n\n### Security report\n\u003cimg src=\"docs/static/images/island/reports-page/security-report-overview.png\"\u003e\n\n## Main Features\n\nInfection Monkey uses the following techniques and exploits to propagate to\nother machines.\n\n* Multiple propagation techniques:\n  * Predefined passwords\n  * Common logical exploits\n  * Password stealing using Mimikatz\n* Multiple exploit methods:\n  * Log4Shell\n  * RDP\n  * SSH\n  * SMB\n  * WMI\n  * and more, see our [documentation\n    hub](https://techdocs.akamai.com/infection-monkey/docs/exploiters/) for\n    more information.\n\n## Setup\nCheck out the\n[Setup](https://techdocs.akamai.com/infection-monkey/docs/setting-up-infection-monkey/)\npage and the [Getting\nStarted](https://techdocs.akamai.com/infection-monkey/docs/getting-started/)\nguide in our documentation.\n\nInfection Monkey supports a variety of platforms, documented [in our\ndocumentation\nhub](https://techdocs.akamai.com/infection-monkey/docs/operating-systems/).\n\n## Building the Monkey from the source\nTo deploy the development version of Monkey you should refer to readme in the\n[deployment scripts](deployment_scripts) folder or follow the documentation in\nthe [documentation\nhub](https://techdocs.akamai.com/infection-monkey/docs/development-setup/).\n\n### Build status\n| Branch | Status |\n| ------ | :----: |\n| Develop | [![Build Status](https://travis-ci.com/guardicore/monkey.svg?branch=develop)](https://travis-ci.com/guardicore/monkey) |\n| Master | [![Build Status](https://travis-ci.com/guardicore/monkey.svg?branch=master)](https://travis-ci.com/guardicore/monkey) |\n\n## Tests\n\n### Unit Tests\n\nIn order to run all of the Unit Tests, run the command `pytest` in the `monkey`\ndirectory.\n\nTo get a coverage report, first make sure the `pytest-cov` package is installed\nusing `pip install pytest-cov`. Run the command `pytest --cov-report=html --cov\n.` in the `monkey/` directory. The coverage report can be found in\n`htmlcov/index.html`.\n\n### Blackbox tests\n\nIn order to run the Blackbox tests, refer to\n`envs/monkey_zoo/blackbox/README.md`.\n\n# License\n\nCopyright (c) Guardicore Ltd\n\nSee the [LICENSE](LICENSE) file for license rights and limitations (GPLv3).\n","funding_links":[],"categories":["\u003ca id=\"tag-dev\" href=\"#tag-dev\"\u003eDev\u003c/a\u003e","Web","\u003ca id=\"1233584261c0cd5224b6e90a98cc9a94\"\u003e\u003c/a\u003e渗透\u0026\u0026offensive\u0026\u0026渗透框架\u0026\u0026后渗透框架","Python","Python (1887)","\u003ca id=\"5dd93fbc2f2ebc8d98672b2d95782af3\"\u003e\u003c/a\u003e工具","Uncategorized","Threat Simulation","security-tools","扫描器_资产收集_子域名","3. Fault Injection","Synopsis"],"sub_categories":["\u003ca id=\"tag-dev.security\" href=\"#tag-dev.security\"\u003eSecurity\u003c/a\u003e","Scanning / Pentesting","\u003ca id=\"2051fd9e171f2698d8e7486e3dd35d87\"\u003e\u003c/a\u003e渗透多合一\u0026\u0026渗透框架","Uncategorized","Tools","资源传输下载","Security","Table of Contents"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fguardicore%2Fmonkey","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fguardicore%2Fmonkey","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fguardicore%2Fmonkey/lists"}