diff --git a/.github/attack-report.png b/.github/attack-report.png new file mode 100644 index 000000000..5ba45e9fb Binary files /dev/null and b/.github/attack-report.png differ diff --git a/.github/map-full.png b/.github/map-full.png index faa1b7832..92902a221 100644 Binary files a/.github/map-full.png and b/.github/map-full.png differ diff --git a/.github/security-report.png b/.github/security-report.png new file mode 100644 index 000000000..54a30b13f Binary files /dev/null and b/.github/security-report.png differ diff --git a/.github/zero-trust-report.png b/.github/zero-trust-report.png new file mode 100644 index 000000000..18a0ff703 Binary files /dev/null and b/.github/zero-trust-report.png differ diff --git a/README.md b/README.md index 83fd878ad..bf9768459 100644 --- a/README.md +++ b/README.md @@ -13,10 +13,6 @@ Welcome to the Infection Monkey! The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server. - - - - The Infection Monkey is comprised of two parts: * **Monkey** - A tool which infects other machines and propagates to them. @@ -24,6 +20,20 @@ The Infection Monkey is comprised of two parts: To read more about the Monkey, visit [infectionmonkey.com](https://infectionmonkey.com). +## Screenshots + +### Map + + +### Security report + + +### Zero trust report + + +### ATT&CK report + + ## Main Features The Infection Monkey uses the following techniques and exploits to propagate to other machines. @@ -40,6 +50,8 @@ The Infection Monkey uses the following techniques and exploits to propagate to * Conficker * SambaCry * Elastic Search (CVE-2015-1427) + * Weblogic server + * and more ## Setup Check out the [Setup](https://github.com/guardicore/monkey/wiki/setup) page in the Wiki or a quick getting [started guide](https://www.guardicore.com/infectionmonkey/wt/).