From 4ca7fdeae93e657c1aede8472c0b0d22db1b0885 Mon Sep 17 00:00:00 2001 From: ybasford Date: Sun, 28 Aug 2022 14:38:41 +0300 Subject: [PATCH] Docs: Changed to US spelling --- docs/content/usage/scenarios/custom-scenario/other.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/content/usage/scenarios/custom-scenario/other.md b/docs/content/usage/scenarios/custom-scenario/other.md index 456b0486c..dc35cf5c8 100644 --- a/docs/content/usage/scenarios/custom-scenario/other.md +++ b/docs/content/usage/scenarios/custom-scenario/other.md @@ -9,7 +9,7 @@ weight: 100 ## Overview This page provides additional information about configuring the Infection Monkey, tips and tricks and creative usage scenarios. -## Custom behaviour +## Custom behavior If you want the Infection Monkey to run a specific script or tool after it breaches a machine, you can configure it in **Configuration -> Monkey -> Post-breach**. Input commands you want to execute in the corresponding fields.