An advanced post-exploitation framework designed for Linux/Windows environments
ssh-harvester-v3.mp4
curl -sSL https://raw.githubusercontent.com/jm33-m0/emp3r0r/refs/heads/v3/install.sh | bash
emp3r0r server --c2-hosts '192.168.200.3' --port 12345 --operators 3
This command initiates emp3r0r with:
- HTTP2/TLS agent listener on a random port, with valid hostname
192.168.200.3
in TLS server certificate - WireGuard operator service on port
12345
- Operator mTLS server on
wg_ip:12346
(operators share the same certificate, but have different WireGuard profiles) - 3 pre-registered operator slots
The server will display all necessary configuration details for operator setup.

emp3r0r client --c2-host '192.168.200.3' --c2-port 12345 --server-wg-ip 'C2 Server IP (WG)' --server-wg-key 'C2 Public Key' --operator-wg-ip 'IP ADDRESS'
This command:
- Establishes a connection between the emp3r0r operator and the remote server at
192.168.200.3:12345
- Configures WireGuard connectivity between operator and server using the parameters provided in server output
- Supports multiple operators (each requiring unique WireGuard profiles)
- Note: If connection stalls after entering the operator's private key, verify that keys/IPs match correctly

Use the generate
command from within the emp3r0r shell interface.
- Breaking changes are typically documented in release logs. Cross-version compatibility is not guaranteed due to ongoing feature development and bug fixes.
- If you encounter issues, try removing
~/.emp3r0r
directory and starting fresh. - The wiki may not reflect all features in
v3
. Refer to command-line help for the most current information. Community contributions to the wiki are welcome.
emp3r0r was initially developed as a research project for implementing Linux adversary techniques alongside original ideas. It has evolved into a comprehensive framework addressing the need for advanced post-exploitation capabilities specifically targeting Linux environments.
What distinguishes emp3r0r is its position as one of the first C2 frameworks purpose-built for Linux targets while providing seamless integration with external tools. The comprehensive feature list demonstrates its versatility.
For extensibility, emp3r0r offers complete python3 support via the vaccine
module (15MB total), including essential packages like Impacket
, Requests
, and MySQL
. The framework supports diverse module formats including bash
, powershell
, python
, dll
, so
, and exe
.
-
Advanced Command-Line Interface
-
Operational Security
- Dynamic
argv
manipulation for process listing obfuscation - File and PID concealment through Glibc hijacking (via
patcher
inget_persistence
) - Bring Your Own Shell functionality supporting
elvish
and other interactive programs through custom modules
- Dynamic
-
Secure Communications
- HTTP2/TLS-based command and control
- UTLS implementation to defeat JA3 fingerprinting
- KCP-based fast, multiplexed, anonymous UDP tunneling to obfuscate C2 traffic
- Support for external proxying such as TOR and CDNs
- Operators connect to C2 using WireGuard and mTLS
-
Memory Forensics Capabilities
- Cross-platform memory dumping
- Windows mini-dump extraction compatible with pypykatz
-
Flexible Payload Delivery
- Multi-stage delivery for both Linux and Windows targets
- HTTP Listener with AES encryption and compression
- Platform-specific payloads: DLL agent, Shellcode agent (Windows), and Shared Library stager (Linux)
-
Network Traversal
- Automatic agent bridging via Shadowsocks proxy chain for internal network access
- Reverse proxy capabilities through SSH and KCP tunneling
- External target access for endpoints unreachable by direct connection
-
Operational Efficiency
- Parallel command execution for uninterrupted workflow
- Modular architecture supporting custom extensions
- In-memory execution for
bash
,powershell
,python
, and ELF binaries viaCGO
ELF loader
-
Enhanced Shell Experience
- SSH integration with PTY support
- Windows compatibility with standard SSH clients
-
Additional Capabilities
- Bettercap integration
- Multiple persistence mechanisms
- Comprehensive post-exploitation toolset
- OpenSSH credential harvesting
- Advanced Process and Shellcode injection
- ELF binary patching for persistent access
- Bidirectional port mapping (TCP/UDP)
- Agent-side Socks5 proxy with UDP support
- Privilege escalation tools and suggestions
- System information collection
- File management with integrity verification and compression
- SFTP integration for convenient remote file access
- Log sanitization utilities
- Screenshot functionality
- Anti-analysis capabilities
- Network connectivity verification