[go: up one dir, main page]

Introducing G2.ai, the future of software buying.Try now
OpenBAS by Filigran
Sponsored
OpenBAS by Filigran
Visit Website
Product Avatar Image
Infection Monkey

By GuardiCore

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Infection Monkey and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
OpenBAS by Filigran
Sponsored
OpenBAS by Filigran
Visit Website
It's been two months since this profile received a new review
Leave a Review

Infection Monkey Reviews & Product Details

Infection Monkey Product Details
OpenBAS by Filigran
Sponsored
OpenBAS by Filigran
Visit Website
Product Avatar Image

Have you used Infection Monkey before?

Answer a few questions to help the Infection Monkey community

Infection Monkey Reviews (3)

Reviews

Infection Monkey Reviews (3)

4.8
3 reviews

Search reviews
View Filters
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
TA
Security Consultant
Mid-Market (51-1000 emp.)
"Best Breach and attack Simulation Tool"
What do you like best about Infection Monkey?

Its open source and the best thing about the infection monkey it works in cloud really effective, also the GUI is nice. Review collected by and hosted on G2.com.

What do you dislike about Infection Monkey?

Everytime we need to launch the docker with new image, also few customization is missing compared to other simulation tools Review collected by and hosted on G2.com.

SA
Red Team Director
Mid-Market (51-1000 emp.)
"Best Open Source Breach and Attack Simulation tool"
What do you like best about Infection Monkey?

Ease of use, GUI is simple and attractive, Zero trust testing feature and also very good for cloud continues security testing and easy to deploy Review collected by and hosted on G2.com.

What do you dislike about Infection Monkey?

Privilege escalation and EDR evasion is not there Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
AC
Mid-Market (51-1000 emp.)
"Breach and Attack Simulation Tool"
What do you like best about Infection Monkey?

Integration with Scout Suite for Cloud Security Posture Management Review collected by and hosted on G2.com.

What do you dislike about Infection Monkey?

Ports range cant be allowed all at a time for scanning Review collected by and hosted on G2.com.

There are not enough reviews of Infection Monkey for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Picus Security Logo
Picus Security
4.9
(215)
Measure - Picus tells you security effectiveness right now including all emerging threats.; Categorize - Picus helps you prioritize your security resources to where you need it the most.; Monitor - continually asses your resilience to threats.; Alarm - Picus sends alarms for the situations where your security risk increases.
2
Cymulate: Security Validation and Exposure Management Platform Logo
Cymulate: Security Validation and Exposure Management Platform
4.9
(168)
Cymulate comprehensively identifies the security gaps in your infrastructure and provides actionable insights for proper remediation. Run safely from the internet, our battery of simulated attacks causes no interruption to your operation or business productivity.
3
vPenTest Logo
vPenTest
4.6
(206)
vPenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error. vPenTest essentially combines the knowledge, methodologies, techniques, and commonly used tools of multiple consultants into a single platform that consistently exceeds expectations of a penetration test. By developing our proprietary framework that continuously grows based on our research & development, we’re able to modernize the way penetration tests are conducted.
4
Pentera Logo
Pentera
4.5
(143)
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
5
RidgeBot Logo
RidgeBot
4.5
(91)
RidgeBot, a robotic penetration testing system, fully automates the testing process by coupling ethical hacking techniques to decision-making algorithms. RidgeBots locate risks and vulnerabilities discovered in network, servers, and applications, prove the potential impact or damage with exploit evidence. It provides risk-based vulnerability management and alleviates the shortage of security testing personnel by automation.
6
Defendify All-In-One Cybersecurity Solution Logo
Defendify All-In-One Cybersecurity Solution
4.7
(57)
Defendify is the only all-in-one SaaS-delivered cybersecurity platform designed specifically for small and mid-sized businesses. As a single pane of glass, Defendify provides multiple layers of ongoing protection to continuously improve the strength of your security posture against evolving cyber threats.
7
AttackIQ Platform Logo
AttackIQ Platform
4.5
(1)
AttackIQ's Adversarial Exposure Validation (AEV Platform is a comprehensive solution designed to continuously assess and enhance an organization's cybersecurity posture. By emulating real-world adversary behaviors, the platform identifies vulnerabilities, tests security controls, and provides actionable insights to mitigate risks. Aligned with the MITRE ATT&CK® framework, AttackIQ enables organizations to proactively address security gaps, ensuring defenses are resilient against evolving threats. Key Features and Functionality: - Continuous Asset Discovery: Automatically identifies assets, vulnerabilities, and misconfigurations to eliminate blind spots and reduce risk exposure. - Real-World Scenario Testing: Emulates the latest adversary tactics to validate the effectiveness of security controls against threats pertinent to the organization. - Prioritized Recommendations: Offers MITRE ATT&CK®-aligned guidance, focusing remediation efforts on the most critical exposures for optimal resource allocation. - Actionable Remediation Guidance: Provides clear, step-by-step instructions to address identified vulnerabilities, facilitating swift improvements in security posture. - Exposure Management Score: Monitors and quantifies security improvements, enabling organizations to demonstrate progress and justify investments to stakeholders. - Integration Capabilities: Seamlessly integrates with third-party vulnerability scanners, centralizing data and automating tasks to streamline security operations. Primary Value and Problem Solved: The AttackIQ AEV Platform empowers organizations to proactively identify and remediate security gaps before adversaries can exploit them. By continuously validating security controls and providing actionable insights, the platform enhances resilience against cyber threats, reduces the risk of breaches, and optimizes resource allocation. This proactive approach ensures that security teams can stay ahead of emerging threats, maintain compliance with industry standards, and effectively communicate security improvements to stakeholders.
8
Adaptive Security Logo
Adaptive Security
5.0
(30)
Adaptive Security offers a comprehensive suite of cybersecurity solutions designed to enhance organizational resilience against evolving threats. Their offerings include Phishing Simulations, Security Awareness Training, and Phishing Triage, all tailored to meet the unique needs of businesses ranging from small enterprises to Fortune 500 companies.
9
Sophos PhishThreat Logo
Sophos PhishThreat
4.3
(22)
Sophos PhishThreat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture. Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.
10
XM Cyber Exposure Management Platform Logo
XM Cyber Exposure Management Platform
3.5
(1)
XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Infection Monkey Comparisons
Product Avatar Image
Cymulate: Security Validation and Exposure Management Platform
Compare Now