monkey/monkey
Mike Salvatore 2549f088d1 agent: Do not encrypt Windows shortcuts in ransomware simulation
In order to keep Infection Monkey safe for production environments, the
ransomware payload will explicitly ignore Windows shortcuts to prevent
important files from accidentally getting encrypted.
2021-06-22 15:27:48 -04:00
..
common Refactored configuration import and added a check to decide if configuration is encrypted or not. This solved a bug where invalid json was treated as credential error. 2021-06-11 11:40:07 +03:00
infection_monkey agent: Do not encrypt Windows shortcuts in ransomware simulation 2021-06-22 15:27:48 -04:00
monkey_island Merge pull request #1255 from guardicore/ransomware_stub 2021-06-22 09:59:14 -04:00
tests agent: Add is_not_shortcut_filter() 2021-06-22 15:27:48 -04:00
.coveragerc ci: add .coveragerc to omit unit test code from coverage report 2021-01-17 20:20:06 -05:00
__init__.py Reformat all python with black v20.8b1 2021-04-06 09:20:18 -04:00
codecov.yml Updated codecov coloring. 2020-03-15 11:50:43 +02:00
infection_monkey.py String vs byte stream mixup bugs fixed 2019-09-20 18:07:17 +03:00
monkey_island.py island: Rename start_island() -> main() 2021-06-03 11:01:03 -04:00