Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Infection Monkey Alternatives

Infection Monkey Reviews & Product Details

Infection Monkey Overview

What is Infection Monkey?

By deploying the Infection Monkey as an ongoing testing solution, you can verify the security baseline of your network and achieve full network coverage.

Infection Monkey Details
Show LessShow More
Product Description

By deploying the Infection Monkey as an ongoing testing solution, you can verify the security baseline of your network and achieve full network coverage.


Seller Details
HQ Location
Tel Aviv, IL
Twitter
@GuardiCore
2,710 Twitter followers
LinkedIn® Page
www.linkedin.com
101 employees on LinkedIn®

Recent Infection Monkey Reviews

TA
Trilok A.Mid-Market (51-1000 emp.)
5.0 out of 5
"Best Breach and attack Simulation Tool"
Its open source and the best thing about the infection monkey it works in cloud really effective, also the GUI is nice.
SA
Satykam A.Mid-Market (51-1000 emp.)
4.5 out of 5
"Best Open Source Breach and Attack Simulation tool"
Ease of use, GUI is simple and attractive, Zero trust testing feature and also very good for cloud continues security testing and easy to deploy
Verified User
A
Verified UserMid-Market (51-1000 emp.)
5.0 out of 5
"Breach and Attack Simulation Tool"
Integration with Scout Suite for Cloud Security Posture Management
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Infection Monkey Media

Answer a few questions to help the Infection Monkey community
Have you used Infection Monkey before?
Yes

3 Infection Monkey Reviews

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
3 Infection Monkey Reviews
4.8 out of 5
3 Infection Monkey Reviews
4.8 out of 5
G2 reviews are authentic and verified.
TA
Security Consultant
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Infection Monkey?

Its open source and the best thing about the infection monkey it works in cloud really effective, also the GUI is nice. Review collected by and hosted on G2.com.

What do you dislike about Infection Monkey?

Everytime we need to launch the docker with new image, also few customization is missing compared to other simulation tools Review collected by and hosted on G2.com.

Recommendations to others considering Infection Monkey:

Read the documentation properly before instaling and configuring infection monkey Review collected by and hosted on G2.com.

What problems is Infection Monkey solving and how is that benefiting you?

Automatic breach and attack simulation in aws cloud and red teaming activities. Review collected by and hosted on G2.com.

SA
Red Team Director
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Infection Monkey?

Ease of use, GUI is simple and attractive, Zero trust testing feature and also very good for cloud continues security testing and easy to deploy Review collected by and hosted on G2.com.

What do you dislike about Infection Monkey?

Privilege escalation and EDR evasion is not there Review collected by and hosted on G2.com.

What problems is Infection Monkey solving and how is that benefiting you?

Breach and Attack simulation, Automatic security testing Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
AC
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Infection Monkey?

Integration with Scout Suite for Cloud Security Posture Management Review collected by and hosted on G2.com.

What do you dislike about Infection Monkey?

Ports range cant be allowed all at a time for scanning Review collected by and hosted on G2.com.

What problems is Infection Monkey solving and how is that benefiting you?

Try to breach the server and check the hardening quality of it Review collected by and hosted on G2.com.

There are not enough reviews of Infection Monkey for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cymulate: Security Validation and Exposure Management Platform Logo
Cymulate: Security Validation and Exposure Management Platform
4.9
(124)
Cymulate comprehensively identifies the security gaps in your infrastructure and provides actionable insights for proper remediation. Run safely from the internet, our battery of simulated attacks causes no interruption to your operation or business productivity.
2
vPenTest Logo
vPenTest
4.7
(172)
vPenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error. vPenTest essentially combines the knowledge, methodologies, techniques, and commonly used tools of multiple consultants into a single platform that consistently exceeds expectations of a penetration test. By developing our proprietary framework that continuously grows based on our research & development, we’re able to modernize the way penetration tests are conducted.
3
Pentera Logo
Pentera
4.5
(137)
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
4
Defendify All-In-One Cybersecurity® Solution Logo
Defendify All-In-One Cybersecurity® Solution
4.7
(57)
Defendify is the only all-in-one SaaS-delivered cybersecurity platform designed specifically for small and mid-sized businesses. As a single pane of glass, Defendify provides multiple layers of ongoing protection to continuously improve the strength of your security posture against evolving cyber threats.
5
RidgeBot Logo
RidgeBot
4.5
(76)
RidgeBot, a robotic penetration testing system, fully automates the testing process by coupling ethical hacking techniques to decision-making algorithms. RidgeBots locate risks and vulnerabilities discovered in network, servers, and applications, prove the potential impact or damage with exploit evidence. It provides risk-based vulnerability management and alleviates the shortage of security testing personnel by automation.
6
Picus Security Logo
Picus Security
4.8
(4)
Measure - Picus tells you security effectiveness right now including all emerging threats.; Categorize - Picus helps you prioritize your security resources to where you need it the most.; Monitor - continually asses your resilience to threats.; Alarm - Picus sends alarms for the situations where your security risk increases.
7
AttackIQ Platform Logo
AttackIQ Platform
4.5
(1)
8
Sophos PhishThreat Logo
Sophos PhishThreat
4.3
(21)
Sophos PhishThreat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture. Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.
9
XM Cyber Exposure Management Platform Logo
XM Cyber Exposure Management Platform
3.5
(1)
XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7.
10
IBM Security Randori Recon Logo
IBM Security Randori Recon
4.3
(26)
Show More