You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -51,12 +51,12 @@ The Infection Monkey uses the following techniques and exploits to propagate to
51
51
* SambaCry
52
52
* Elastic Search (CVE-2015-1427)
53
53
* Weblogic server
54
-
* and more
54
+
* and more, see our [Documentation hub](https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/) for more information about our RCE exploiters.
55
55
56
56
## Setup
57
57
Check out the [Setup](https://www.guardicore.com/infectionmonkey/docs/setup/) page in the Wiki or a quick getting [started guide](https://www.guardicore.com/infectionmonkey/docs/usage/getting-started/).
58
58
59
-
The Infection Monkey supports a variety of platforms, documented [in the documentation framework](https://www.guardicore.com/infectionmonkey/docs/reference/operating_systems_support/).
59
+
The Infection Monkey supports a variety of platforms, documented [in our documentation hub](https://www.guardicore.com/infectionmonkey/docs/reference/operating_systems_support/).
60
60
61
61
## Building the Monkey from source
62
62
To deploy development version of monkey you should refer to readme in the [deployment scripts](deployment_scripts)
0 commit comments