EmpireC2Project

123 Followers
4 Following
117 Posts
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
http://empirec2project.com/

Empire v6.6.0 sponsors early access is live!

- Brand New C Agent (Cpire)
- 49 new ATT&CK modules
- 8 new BOFs: unhook, patchit, AMSI/ETW bypass, credman, handlekatz, bofroast
- Tons of improvements and fixes!

https://github.com/BC-SECURITY/Empire

Empire v6.5 is live!
- 8 new modules across BOF/C#/PS/Python
- New C stager + PIC shellcode compiler for stage0 agent injection
- Patchless AMSI & ETW bypasses
- New Jobs tab on the agent page for managing background jobs
- Python 3.14 support
https://github.com/BC-SECURITY/Empire
GitHub - BC-SECURITY/Empire: Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. - BC-SECURITY/Empire

GitHub
Introducing Starkiller Assistant! Our new AI-powered helper for Empire operators. It's like Clippy, but for C2. After months of R&D, early testers describe it as "confidently wrong" and "worse than no help at all." We're so proud.
Empire 6.4 is now public! Here are just a few updates:
- Added C# spawn module
- Auto-install for plugin marketplace
- New task display with parameters
- Added "Rerun Task" to Agents and Plugins
- Added customizable table headers
- Added Debian 13 support
https://github.com/BC-SECURITY/Empire
Empire v6.3.0 is out!
• mTLS agents & listeners
• ChaCha20-Poly1305 encryption + DH key exchange
• HTTPS host reuse across HTTP & malleable listeners
• Customizable C# obfuscation via EmpireCompiler
• Major dependency upgrades & stability fixes
https://github.com/BC-SECURITY/Empire
One of the biggest upgrades to our agents is nearing completion and can be tested on our main development branch available to Sponsors.
- Updated routing packets from RC4 to ChaCha20
- Brand new C# obfuscation and customizable XMLs
- Added mTLS support
https://github.com/BC-SECURITY/Empire

Empire v6.2 is Out!

Here are a few of the updates:
- Go and C# Agent Improvements
- Clean & reset server options
- Added port normalization
- Allow X-Empire-Token for API access

https://github.com/BC-SECURITY/Empire

GitHub - BC-SECURITY/Empire: Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. - BC-SECURITY/Empire

GitHub

We are working on getting Empire and its dependencies into the @nixos repository at @defcon

https://github.com/NixOS/nixpkgs/pull/432397

empire-compiler: init at 0.3.3 by fzakaria · Pull Request #432397 · NixOS/nixpkgs

Add empire-compiler Built on platform: x86_64-linux aarch64-linux x86_64-darwin aarch64-darwin Tested, as applicable: NixOS tests in nixos/tests. Package tests at passthru.tests. Tests ...

GitHub

Video: Introduction to Beacon Object Files (BOFs)! Executing native code in-memory and at runtime to improve red team stealth. 😎 We start small to understand Dynamic Function Resolution and create a small Empire module to call Win32 API functions! https://youtu.be/p3fByg8pa1g

And a HUGE thank you to @bcsecurity for sponsoring this video! Get expert-led training on advanced threat emulation or cybersecurity services across the board with BC Security: https://jh.live/bcsecurity

New Empire Release: v6.1.3 is LIVE!

What’s new:
- Fixed PowerShell agent’s base64 cookie bug in HTTP listener
- Updated module names & descriptions
- Filter modules by agent language
- Folder view for agent modules (👀 see it in action below)

#RedTeam #CyberSecurity #infosec