An advanced post-exploitation framework designed for Linux/Windows environments
emp3r0r is a comprehensive post-exploitation framework that stands out as one of the first C2 frameworks purpose-built for Linux environments while providing seamless Windows integration. Originally developed as a research project for implementing Linux adversary techniques, it has evolved into a robust framework addressing the need for advanced post-exploitation capabilities.
- Linux-First Design: Purpose-built for Linux targets with extensive Windows support
- Extensible Architecture: Complete Python3 support via the
vaccine
module (15MB) including Impacket, Requests, and MySQL - Diverse Module Support: Bash, PowerShell, Python, DLL, SO, and EXE modules
- Advanced Evasion: Dynamic process obfuscation and file concealment capabilities
curl -sSL https://raw.githubusercontent.com/jm33-m0/emp3r0r/refs/heads/v3/install.sh | bash
emp3r0r server --c2-hosts 'your.domain.com' --port 12345 --operators 2
This command initiates emp3r0r with:
- HTTP2/TLS agent listener on random port with a TLS server certificate valid for
your.domain.com
- WireGuard operator service on specified port (
12345
) - Operator mTLS server on
wg_ip:12346
- Pre-registered operator slots (2 in this example)
The server displays:
- WireGuard Server Configuration - server IP, port, and public key
- WireGuard Operator Configurations - each operator's credentials
- Client Connection Commands - ready-to-use commands
Copy the generated connection command and replace <C2_PUBLIC_IP>
with your server's IP:
emp3r0r client --c2-port 12345 --server-wg-key 'key...' --c2-host your.domain.com
Connection Process:
- Each operator receives a unique, pre-configured connection command
- For local testing: use
127.0.0.1
as the C2 host, copy the generated command for local setup, and run it in the same tmux session - For remote connections: replace
<C2_PUBLIC_IP>
with your server's public IP or domain - System prompts for operator's private key (displayed in server configuration)
- WireGuard connectivity is automatically configured
Use the generate
command from within the emp3r0r shell interface.
π Security & Stealth
-
Advanced Evasion
- Dynamic
argv
manipulation for process listing obfuscation - File and PID concealment through Glibc hijacking
- Anti-analysis capabilities
- Dynamic
-
Secure Communications
- HTTP2/TLS-based command and control
- UTLS implementation to defeat JA3 fingerprinting
- KCP-based fast, multiplexed UDP tunneling
- TOR and CDN proxy support
- WireGuard + mTLS operator connections
π₯οΈ User Experience
-
Advanced CLI Interface
- Built on console and cobra frameworks
- Comprehensive auto-completion with syntax highlighting
- Multi-tasking through tmux integration
- Bring Your Own Shell functionality (elvish support)
-
Enhanced Shell Experience
- SSH integration with PTY support
- Windows compatibility with standard SSH clients
- SFTP integration for remote file access
π Network Capabilities
- Network Traversal
- Automatic agent bridging via Shadowsocks proxy chain
- Reverse proxy through SSH and KCP tunneling
- External target access for unreachable endpoints
- Bidirectional port mapping (TCP/UDP)
- Agent-side Socks5 proxy with UDP support
π§ Payload & Execution
-
Flexible Payload Delivery
- Multi-stage delivery for Linux and Windows
- HTTP Listener with AES encryption and compression
- DLL agent, Shellcode agent (Windows)
- Shared Library stager (Linux)
-
In-Memory Execution
- Bash, PowerShell, Python, and ELF binaries
- CGO ELF loader for memory-only execution
- Process and shellcode injection
- ELF binary patching for persistence
π― Post-Exploitation
-
Memory Forensics
- Cross-platform memory dumping
- Windows mini-dump extraction (pypykatz compatible)
-
Additional Capabilities
- Bettercap integration
- Multiple persistence mechanisms
- OpenSSH credential harvesting
- Privilege escalation tools and suggestions
- System information collection
- File management with integrity verification
- Screenshot functionality
- Log sanitization utilities
Join our Discord server for discussions, support, and updates!
- πΈ Screenshots and Videos - Visual guide to emp3r0r's capabilities
- π Features Overview - Comprehensive feature list
- π Security Policy - Security guidelines and reporting
- π Changelog - Recent updates and changes
Common Issues:
- Connection stalls: Verify C2 host IP/domain and WireGuard configuration
- Compatibility issues: Remove
~/.emp3r0r
directory and start fresh - Feature questions: Use command-line help for current information
Note: Cross-version compatibility is not guaranteed due to ongoing development. Check release logs for breaking changes.
If emp3r0r has been helpful in your work, please consider supporting its development:
Your sponsorship helps:
- π Accelerate development of new features and improvements
- π‘οΈ Maintain security with regular updates and vulnerability fixes
- π Improve documentation and create better learning resources
- π§ Provide community support and respond to issues faster
- π‘ Research and innovation in post-exploitation techniques
Every contribution, no matter the size, makes a difference in keeping emp3r0r actively maintained and evolving!
This project is licensed under the MIT License - see the LICENSE file for details.