Infection Monkey vs Stratus Red Team
GitHub Stats
About Infection Monkey
Infection Monkey is an open-source adversary emulation platform developed by Guardicore (now Akamai) that automatically tests network security controls by simulating real-world attack techniques. It propagates through the network using a variety of exploitation methods, credential theft, and lateral movement techniques mapped to the MITRE ATT&CK framework, then generates detailed reports on security gaps. Security teams and red team operators use Infection Monkey to validate segmentation policies, test detection capabilities, and identify attack paths that could be exploited by real adversaries without causing actual damage. The platform runs continuous or on-demand breach simulations and provides actionable remediation recommendations, making it particularly valuable for organizations that need to validate their security posture against realistic attack scenarios.
About Stratus Red Team
Stratus Red Team is Datadog's open-source adversary emulation tool specifically designed for cloud environments. While tools like CALDERA focus on endpoint and network attacks, Stratus Red Team provides granular, atomic attack techniques for AWS, Azure, GCP, and Kubernetes — mapped directly to the MITRE ATT&CK Cloud Matrix. Each technique is self-contained: Stratus handles all prerequisite infrastructure setup (creating test IAM roles, S3 buckets, EC2 instances), executes the attack technique, and then cleans up. This makes it ideal for purple team exercises where you need to validate that your cloud detection rules actually fire when specific attack patterns occur. Techniques cover initial access (stolen credentials, malicious Lambda layers), persistence (backdoor IAM users, modified trust policies), privilege escalation (IAM policy manipulation), and impact (S3 ransomware simulation). The CLI-based interface supports warm-up, detonate, and revert phases for repeatable testing.
Platform Support
Tags
Infection Monkey only
Stratus Red Team only