Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. The Empire server is written in Python 3 and is modular to allow operator flexibility. Empire comes built-in with a client that can be used remotely to access the server. There is also a GUI available for remotely accessing the Empire server, Starkiller.
- Server/Client Architecture for Multiplayer Support
- Supports GUI & CLI Clients
- Fully encrypted communications
- HTTP/S, Malleable HTTP, OneDrive, Dropbox, and PHP Listeners
- Massive library (400+) of supported tools in PowerShell, C#, & Python
- Donut Integration for shellcode generation
- Modular plugin interface for custom server features
- Flexible module interface for adding new tools
- Integrated obfuscation using ConfuserEx 2 & Invoke-Obfuscation
- In-memory .NET assembly execution
- Customizable Bypasses
- JA3/S and JARM Evasion
- MITRE ATT&CK Integration
- Integrated Roslyn compiler (Thanks to Covenant)
- Docker, Kali, ParrotOS, Ubuntu 20.04/22.04, and Debian 10/11/12 Install Support
- PowerShell
- Python 3
- C#
- IronPython 3
- to add
When cloning this repository, you will need to recurse submodules.
git clone --recursive https://github.com/Deranged0tter/Empire.git
Check out the Installation Page for install instructions.
Note: The main
branch is a reflection of the latest changes and may not always be stable.
After cloning the repo, you can checkout the latest stable release by running the setup/checkout-latest-tag.sh
script.
git clone --recursive https://github.com/Deranged0tter/Empire.git
cd Empire
./setup/checkout-latest-tag.sh
./ps-empire install -y
# Start Server
./ps-empire server
# Help
./ps-empire server -h
# Start Client
./ps-empire client
# Help
./ps-empire client -h
Check out the Empire Docs for more instructions on installing and using with Empire. For a complete list of changes, see the changelog.