forked from p34709852/monkey
17 lines
638 B
Markdown
17 lines
638 B
Markdown
|
+++
|
||
|
title = "Exploiters"
|
||
|
date = 2020-05-26T20:55:04+03:00
|
||
|
weight = 100
|
||
|
chapter = true
|
||
|
pre = '<i class="fas fa-ethernet"></i> '
|
||
|
tags = ["reference", "exploit"]
|
||
|
+++
|
||
|
|
||
|
# Exploiters
|
||
|
|
||
|
Infection Monkey uses various RCE exploiters. Most of these, in our knowledge, pose no risk to performance or services on victim machines. This documentation serves as a quick introduction to the exploiters currently implemented and vulnerabilities used by them.
|
||
|
|
||
|
{{% children %}}
|
||
|
|
||
|
You can check out the Exploiters' implementation yourself [in the Monkey's GitHub repository](https://github.com/guardicore/monkey/tree/develop/monkey/infection_monkey/exploit).
|