EmpireC2Project

122 Followers
4 Following
114 Posts
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
http://empirec2project.com/
Empire 6.4 is now public! Here are just a few updates:
- Added C# spawn module
- Auto-install for plugin marketplace
- New task display with parameters
- Added "Rerun Task" to Agents and Plugins
- Added customizable table headers
- Added Debian 13 support
https://github.com/BC-SECURITY/Empire
Empire v6.3.0 is out!
• mTLS agents & listeners
• ChaCha20-Poly1305 encryption + DH key exchange
• HTTPS host reuse across HTTP & malleable listeners
• Customizable C# obfuscation via EmpireCompiler
• Major dependency upgrades & stability fixes
https://github.com/BC-SECURITY/Empire
One of the biggest upgrades to our agents is nearing completion and can be tested on our main development branch available to Sponsors.
- Updated routing packets from RC4 to ChaCha20
- Brand new C# obfuscation and customizable XMLs
- Added mTLS support
https://github.com/BC-SECURITY/Empire

Empire v6.2 is Out!

Here are a few of the updates:
- Go and C# Agent Improvements
- Clean & reset server options
- Added port normalization
- Allow X-Empire-Token for API access

https://github.com/BC-SECURITY/Empire

GitHub - BC-SECURITY/Empire: Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. - BC-SECURITY/Empire

GitHub

We are working on getting Empire and its dependencies into the @nixos repository at @defcon

https://github.com/NixOS/nixpkgs/pull/432397

empire-compiler: init at 0.3.3 by fzakaria · Pull Request #432397 · NixOS/nixpkgs

Add empire-compiler Built on platform: x86_64-linux aarch64-linux x86_64-darwin aarch64-darwin Tested, as applicable: NixOS tests in nixos/tests. Package tests at passthru.tests. Tests ...

GitHub

Video: Introduction to Beacon Object Files (BOFs)! Executing native code in-memory and at runtime to improve red team stealth. 😎 We start small to understand Dynamic Function Resolution and create a small Empire module to call Win32 API functions! https://youtu.be/p3fByg8pa1g

And a HUGE thank you to @bcsecurity for sponsoring this video! Get expert-led training on advanced threat emulation or cybersecurity services across the board with BC Security: https://jh.live/bcsecurity

New Empire Release: v6.1.3 is LIVE!

What’s new:
- Fixed PowerShell agent’s base64 cookie bug in HTTP listener
- Updated module names & descriptions
- Filter modules by agent language
- Folder view for agent modules (👀 see it in action below)

#RedTeam #CyberSecurity #infosec

We’re excited to announce that Empire 6.0 is heading to @defcon demo labs!

Come see @_vinnybod and the crew showcase brand new features and upgrades.
#Defcon #dc33

Empire 6.1 is live!
- ARM64 support for Donut
- Added support for Ubuntu 24.04
- Fixed PowerShell launch issues on Linux
- Faster startup & testing with pyyaml C
- Simplified Docker builds
- Cleaner API and updated dependencies

https://github.com/BC-SECURITY/Empire
#RedTeam #Cybersecurity

GitHub - BC-SECURITY/Empire: Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. - BC-SECURITY/Empire

GitHub

Empire v6.0.3 is live!
- SMB listener now starts tasks properly
- Updated IronPython shell to use PowerShell
- Literal cmd interpretation added to IronPython
- Fixed multi_launcher builds for SMB agents
#RedTeam #CyberSecurity

https://github.com/BC-SECURITY/Empire

GitHub - BC-SECURITY/Empire: Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. - BC-SECURITY/Empire

GitHub