Skip to content

Commit

Permalink
Merge remote-tracking branch 'upstream/release/1.9.0' into release/1.9.0
Browse files Browse the repository at this point in the history
  • Loading branch information
VakarisZ committed Aug 5, 2020
2 parents 2c5c16d + b3a3805 commit 815c708
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,12 +51,12 @@ The Infection Monkey uses the following techniques and exploits to propagate to
* SambaCry
* Elastic Search (CVE-2015-1427)
* Weblogic server
* and more
* and more, see our [Documentation hub](https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/) for more information about our RCE exploiters.

## Setup
Check out the [Setup](https://www.guardicore.com/infectionmonkey/docs/setup/) page in the Wiki or a quick getting [started guide](https://www.guardicore.com/infectionmonkey/docs/usage/getting-started/).

The Infection Monkey supports a variety of platforms, documented [in the documentation framework](https://www.guardicore.com/infectionmonkey/docs/reference/operating_systems_support/).
The Infection Monkey supports a variety of platforms, documented [in our documentation hub](https://www.guardicore.com/infectionmonkey/docs/reference/operating_systems_support/).

## Building the Monkey from source
To deploy development version of monkey you should refer to readme in the [deployment scripts](deployment_scripts)
Expand Down

0 comments on commit 815c708

Please sign in to comment.