Skip to content

jm33-m0/emp3r0r

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

emp3r0r

emp3r0r

A powerful Linux/Windows post-exploitation framework designed by Linux users, for Linux environments

Discord GitHub Sponsors Screenshots


SSH Credential Harvesting in Action

ssh-harvester-v3.mp4

What is emp3r0r?

emp3r0r is a comprehensive post-exploitation framework that stands out as one of the first C2 platforms purpose-built for Linux environments. While most frameworks treat Linux as an afterthought, emp3r0r puts it front and center, delivering robust capabilities for penetration testing and red team operations across both Linux and Windows targets.

Why emp3r0r?

  • Linux-Native Architecture: Built from the ground up for Linux targets with full Windows compatibility.
  • Extensible Python Environment: Deploy a complete Python3 runtime with Impacket, Requests, and MySQL libraries via the vaccine module.
  • Universal Module Support: Execute Bash, PowerShell, Python, DLL, SO, and EXE modules seamlessly across platforms.
  • Advanced Stealth: Dynamic process obfuscation, file concealment, time-stomping, and lazy initialization (filesystem modifications only on demand).
  • Modern Infrastructure: WireGuard + mTLS operator authentication, HTTP2/TLS with JA3 evasion, KCP-based UDP tunneling.

Quick Start

Installation

curl -sSL https://raw.githubusercontent.com/jm33-m0/emp3r0r/refs/heads/v3/install.sh | bash

3-Step Deployment

Initialize the Server

emp3r0r server --c2-hosts 'your.domain.com' --port 12345 --operators 2

This command deploys emp3r0r with:

  • HTTP2/TLS agent listener on a randomized port.
  • WireGuard operator service.
  • Operator mTLS server.

Connect as Operator

Copy the generated connection command and replace <C2_PUBLIC_IP> with your server's IP:

emp3r0r client --c2-port 12345 --server-wg-key 'key...' --c2-host your.domain.com

Generate Agent Payloads

Use the generate command from within the emp3r0r shell interface to create customized agent payloads.


Core Capabilities

Stealth & Evasion

OpSec Safety & File Operations

  • Warn-before-write to avoid noisy actions on disk.
  • Minimal footprint until work begins, keeping hosts clean.
  • Consistent artifacts via uniform file handling for predictable, low-profile drops.
  • Generic temps to blend into the system.

Advanced Process Hiding

  • Obfuscated processes and hidden helpers to lower visibility.
  • Anti-debug/analysis measures to make inspection harder.
  • sRDI-like Shellcode Stager: Load ELF binaries from memory without touching disk, similar to sRDI for Windows.

Secure Command & Control

  • JA3-evasive HTTP2/TLS + WireGuard+mTLS keeps operator access locked down.
  • KCP for speed/resilience; TOR/CDN for extra cover.

Operator Experience

Professional CLI Interface

  • Console + Cobra core for robust command handling.
  • Intelligent auto-completion with syntax highlighting.
  • Native tmux integration for parallel operations.
  • BYOS (Bring Your Own Shell): SSH-based reverse PTY that drives any shell available on the target (bash, zsh, sh, python REPL, etc.) over the same tunnel you also reuse for the file manager and transfers.

Advanced Shell Integration

  • SSH PTY for native terminal experience.
  • Windows-compatible with standard OpenSSH clients.
  • SFTP integration for efficient remote file operations.

File Transfer System

  • Bidirectional Transfer: Upload files to agents (put) and download from agents (get) with intuitive commands.
  • Recursive Downloads: Download entire directories with --recursive flag and filter files using regex patterns (--regex).
  • Smart Transfer Strategy: Agents can fetch files from peer agents via encrypted KCP tunnels before falling back to C2, improving speed and stealth.
  • Integrity & Reliability: SHA256 verification plus resumable uploads/downloads so interrupted transfers continue from the last offset.
  • Real-Time Monitoring: Progress bars display transfer speed, completion percentage, and estimated time remaining.
  • Compression: Zstandard compression reduces bandwidth usage and accelerates transfers.
  • FileServer Module: Agents can host an encrypted HTTP server to share files with other agents, enabling peer-to-peer distribution.
  • Security: All transfers occur over HTTP2/TLS connections with lock file protection to prevent concurrent access.

Network Pivoting

Intelligent Network Traversal

  • Auto-bridge agents with Shadowsocks chains to reach isolated segments.
  • Reverse proxies over SSH/KCP (bring2cc) open paths to otherwise unreachable hosts.
  • Bi-directional TCP/UDP port mapping and agent-side Socks5 (with UDP) for flexible pivoting.

Payload Delivery

Flexible Staging Options

  • Multi-stage delivery for Linux and Windows with ELF/DLL/shellcode options.
  • Windows DLL/shellcode agents for loader-friendly drops; Linux shared-library stager for stealthy starts.
  • Built-in listener module supports HTTP, TCP, and UDP protocols for agent-side payload hosting during lateral movement.

Advanced Linux Stager (Outcome-Focused)

  • Keeps the agent payload encrypted until the moment of execution, avoiding plaintext on disk.
  • Watches the agent and auto-restarts with jitter when connectivity/policy requires, so access recovers without manual action.
  • Ships with safe defaults to prevent self-deletion or noisy argv changes when invoked by the stager.
  • Supports multiple listener protocols (HTTP/TCP/UDP) via compile-time configuration.

Agent-Side Listener for Lateral Movement

  • Deploy listeners on compromised hosts to serve payloads internally, bypassing slow C2 connections.
  • Supports http_aes_compressed, tcp_aes_compressed, and udp_aes_compressed for encrypted payload delivery.
  • Ideal for rapid agent propagation within target networks without external communication.

In-Memory Execution

  • Run Bash, PowerShell, Python, and native ELF modules straight from memory.
  • Memory-only loaders and injection paths keep disk footprint low.
  • ELF patcher module lets you graft the agent into existing binaries when needed.

Post-Exploitation Arsenal

Credential Harvesting

  • OpenSSH credential harvesting with real-time monitoring (ssh_harvester).
  • Cross-platform memory dumping capabilities (mem_dump).
  • Windows mini-dump extraction (pypykatz compatible).

Additional Capabilities

  • Screenshot: Fully integrated module for capturing target screens.
  • Vaccine: Deploy a complete Python3 runtime, nmap, socat, and other tools.
  • Persistence: Multiple mechanisms including cron jobs, shell profiles, and binary patching.
  • LPE: Privilege escalation tools with automated suggestions (lpe_suggest).
  • Log Sanitization: clean_log module for anti-forensics.

Documentation & Support

Community

Join our Discord server for real-time discussions, technical support, and the latest updates on emp3r0r development.

Resources

Troubleshooting

  • Connection stalls: Verify C2 host/WireGuard settings.
  • Compatibility: Remove ~/.emp3r0r for a clean install.

Note: Cross-version compatibility is not guaranteed.


Support Development

If emp3r0r has proven valuable in your security research and testing, consider supporting its continued development via GitHub Sponsors.