____ ___
|___ \ / _ \
___ _ __ ___ _ __ __) |_ __| | | |_ __
/ _ \ '_ ` _ \| '_ \|__ <| '__| | | | '__|
| __/ | | | | | |_) |__) | | | |_| | |
\___|_| |_| |_| .__/____/|_| \___/|_|
| |
|_|
i will post further updates here, for convenience
(pinned) updates
- emp3r0r - 0x00 : capabilities, (planned) modules
- emp3r0r - 0x01 : get root via some kernel/userspace exploits
- emp3r0r - 0x02 : a fully-featured reverse bash shell, via HTTP2 tunnel
- emp3r0r - 0x03 : port forwarding via HTTP2
- emp3r0r - 0x04 : pure memory based emp3r0r agents, and a cryptor
- emp3r0r - 0x05 : autoproxy for emp3r0r agents that have no internet access
- emp3r0r - 0x06 : shellcode injection and persistence
- emp3r0r - 0x07 : implement ssh service for reverse proxy, reverse shell, etc
- emp3r0r - 0x08 : Adding custom modules interface to emp3r0r (experimental)
- emp3r0r - 0x09 : Inject emp3r0r into existing processes, execute using custom ELF loader, hide from procfs
overview
happy new year dear
for the last two weeks ive been working on this emp3r0r project. you must have heard of the famous empire, which, is abandoned by its creator obviously.
emp3r0r aims to be a post-exploitation framework, just like empire. the difference, however, is i intend to use go to write CC/agent and other core parts,
this way, it can be easier to port emp3r0r to other platforms
emp3r0r will focus on linux post-exploitation, support for other platforms (MacOS and Windows) are also planned (while the focus will remain on linux)
heres a demo from early development
Comments
comments powered by Disqus