A powerful Linux/Windows post-exploitation framework designed by Linux users, for Linux environments
ssh-harvester-v3.mp4
emp3r0r is a comprehensive post-exploitation framework that stands out as one of the first C2 platforms purpose-built for Linux environments. While most frameworks treat Linux as an afterthought, emp3r0r puts it front and center, delivering robust capabilities for penetration testing and red team operations across both Linux and Windows targets.
- Linux-Native Architecture: Built from the ground up for Linux targets with full Windows compatibility.
- Extensible Python Environment: Deploy a complete Python3 runtime with Impacket, Requests, and MySQL libraries via the
vaccinemodule. - Universal Module Support: Execute Bash, PowerShell, Python, DLL, SO, and EXE modules seamlessly across platforms.
- Advanced Stealth: Dynamic process obfuscation, file concealment, time-stomping, and lazy initialization (filesystem modifications only on demand).
- Modern Infrastructure: WireGuard + mTLS operator authentication, HTTP2/TLS with JA3 evasion, KCP-based UDP tunneling.
curl -sSL https://raw.githubusercontent.com/jm33-m0/emp3r0r/refs/heads/v3/install.sh | bashemp3r0r server --c2-hosts 'your.domain.com' --port 12345 --operators 2This command deploys emp3r0r with:
- HTTP2/TLS agent listener on a randomized port.
- WireGuard operator service.
- Operator mTLS server.
Copy the generated connection command and replace <C2_PUBLIC_IP> with your server's IP:
emp3r0r client --c2-port 12345 --server-wg-key 'key...' --c2-host your.domain.comUse the generate command from within the emp3r0r shell interface to create customized agent payloads.
- Warn-before-write to avoid noisy actions on disk.
- Minimal footprint until work begins, keeping hosts clean.
- Consistent artifacts via uniform file handling for predictable, low-profile drops.
- Generic temps to blend into the system.
- Obfuscated processes and hidden helpers to lower visibility.
- Anti-debug/analysis measures to make inspection harder.
- sRDI-like Shellcode Stager: Load ELF binaries from memory without touching disk, similar to sRDI for Windows.
- JA3-evasive HTTP2/TLS + WireGuard+mTLS keeps operator access locked down.
- KCP for speed/resilience; TOR/CDN for extra cover.
- Console + Cobra core for robust command handling.
- Intelligent auto-completion with syntax highlighting.
- Native tmux integration for parallel operations.
- BYOS (Bring Your Own Shell): SSH-based reverse PTY that drives any shell available on the target (bash, zsh, sh, python REPL, etc.) over the same tunnel you also reuse for the file manager and transfers.
- SSH PTY for native terminal experience.
- Windows-compatible with standard OpenSSH clients.
- SFTP integration for efficient remote file operations.
- Bidirectional Transfer: Upload files to agents (
put) and download from agents (get) with intuitive commands. - Recursive Downloads: Download entire directories with
--recursiveflag and filter files using regex patterns (--regex). - Smart Transfer Strategy: Agents can fetch files from peer agents via encrypted KCP tunnels before falling back to C2, improving speed and stealth.
- Integrity & Reliability: SHA256 verification plus resumable uploads/downloads so interrupted transfers continue from the last offset.
- Real-Time Monitoring: Progress bars display transfer speed, completion percentage, and estimated time remaining.
- Compression: Zstandard compression reduces bandwidth usage and accelerates transfers.
- FileServer Module: Agents can host an encrypted HTTP server to share files with other agents, enabling peer-to-peer distribution.
- Security: All transfers occur over HTTP2/TLS connections with lock file protection to prevent concurrent access.
- Auto-bridge agents with Shadowsocks chains to reach isolated segments.
- Reverse proxies over SSH/KCP (
bring2cc) open paths to otherwise unreachable hosts. - Bi-directional TCP/UDP port mapping and agent-side Socks5 (with UDP) for flexible pivoting.
- Multi-stage delivery for Linux and Windows with ELF/DLL/shellcode options.
- Windows DLL/shellcode agents for loader-friendly drops; Linux shared-library stager for stealthy starts.
- Built-in listener module supports HTTP, TCP, and UDP protocols for agent-side payload hosting during lateral movement.
- Keeps the agent payload encrypted until the moment of execution, avoiding plaintext on disk.
- Watches the agent and auto-restarts with jitter when connectivity/policy requires, so access recovers without manual action.
- Ships with safe defaults to prevent self-deletion or noisy argv changes when invoked by the stager.
- Supports multiple listener protocols (HTTP/TCP/UDP) via compile-time configuration.
- Deploy listeners on compromised hosts to serve payloads internally, bypassing slow C2 connections.
- Supports
http_aes_compressed,tcp_aes_compressed, andudp_aes_compressedfor encrypted payload delivery. - Ideal for rapid agent propagation within target networks without external communication.
- Run Bash, PowerShell, Python, and native ELF modules straight from memory.
- Memory-only loaders and injection paths keep disk footprint low.
- ELF patcher module lets you graft the agent into existing binaries when needed.
- OpenSSH credential harvesting with real-time monitoring (
ssh_harvester). - Cross-platform memory dumping capabilities (
mem_dump). - Windows mini-dump extraction (pypykatz compatible).
- Screenshot: Fully integrated module for capturing target screens.
- Vaccine: Deploy a complete Python3 runtime, nmap, socat, and other tools.
- Persistence: Multiple mechanisms including cron jobs, shell profiles, and binary patching.
- LPE: Privilege escalation tools with automated suggestions (
lpe_suggest). - Log Sanitization:
clean_logmodule for anti-forensics.
Join our Discord server for real-time discussions, technical support, and the latest updates on emp3r0r development.
- πΈ Screenshots and Videos
- π Features Overview
- π Security Policy
- π Changelog
- Connection stalls: Verify C2 host/WireGuard settings.
- Compatibility: Remove
~/.emp3r0rfor a clean install.
Note: Cross-version compatibility is not guaranteed.
If emp3r0r has proven valuable in your security research and testing, consider supporting its continued development via GitHub Sponsors.