[tags]c2c,postexploitation,framework[/tags]
[short_descr]Post-exploitation and adversary emulation framework that is used to aid Red Teams and pentesters.[/short_descr]
[link] https://github.com/BC-SECURITY/Empire [/link]
[long_descr]
The Empire server is written in Python 3 and is modular to allow operator flexibility. Empire comes built-in with a client that can be used remotely to access the server. There is also a GUI available for remotely accessing the Empire server, Starkiller.
Features:
Server/Client Architecture for Multiplayer Support
Supports GUI & CLI Clients
Fully encrypted communications
HTTP/S, Malleable HTTP, OneDrive, Dropbox, and PHP Listeners
Massive library (400+) of supported tools in PowerShell, C#, & Python
Donut Integration for shellcode generation
Modular plugin interface for custom server features
Flexible module interface for adding new tools
Integrated obfuscation using ConfuserEx 2 & Invoke-Obfuscation
[tags]c2c,postexploitation,framework[/tags] [short_descr]Post-exploitation and adversary emulation framework that is used to aid Red Teams and pentesters.[/short_descr] [link] https://github.com/BC-SECURITY/Empire [/link] [long_descr] The Empire server is written in Python 3 and is modular to allow operator flexibility. Empire comes built-in with a client that can be used remotely to access the server. There is also a GUI available for remotely accessing the Empire server, Starkiller.
Features: