Skip to content

jm33-m0/emp3r0r

Repository files navigation

emp3r0r

An advanced post-exploitation framework designed for Linux/Windows environments

ssh-harvester-v3.mp4

View Screenshots and Videos


Getting Started

Installation

curl -sSL https://raw.githubusercontent.com/jm33-m0/emp3r0r/refs/heads/v3/install.sh | bash

Server Configuration

emp3r0r server --c2-hosts '192.168.200.3' --port 12345 --operators 3

This command initiates emp3r0r with:

  • HTTP2/TLS agent listener on a random port, with valid hostname 192.168.200.3 in TLS server certificate
  • WireGuard operator service on port 12345
  • Operator mTLS server on wg_ip:12346 (operators share the same certificate, but have different WireGuard profiles)
  • 3 pre-registered operator slots

The server will display all necessary configuration details for operator setup.

emp3r0r-server

Operator Connection

emp3r0r client --c2-host '192.168.200.3' --c2-port 12345 --server-wg-ip 'C2 Server IP (WG)' --server-wg-key 'C2 Public Key' --operator-wg-ip 'IP ADDRESS'

This command:

  • Establishes a connection between the emp3r0r operator and the remote server at 192.168.200.3:12345
  • Configures WireGuard connectivity between operator and server using the parameters provided in server output
  • Supports multiple operators (each requiring unique WireGuard profiles)
  • Note: If connection stalls after entering the operator's private key, verify that keys/IPs match correctly
emp3r0r-operator

Agent Payload Generation

Use the generate command from within the emp3r0r shell interface.

Important Notes

  • Breaking changes are typically documented in release logs. Cross-version compatibility is not guaranteed due to ongoing feature development and bug fixes.
  • If you encounter issues, try removing ~/.emp3r0r directory and starting fresh.
  • The wiki may not reflect all features in v3. Refer to command-line help for the most current information. Community contributions to the wiki are welcome.

Project Background

emp3r0r was initially developed as a research project for implementing Linux adversary techniques alongside original ideas. It has evolved into a comprehensive framework addressing the need for advanced post-exploitation capabilities specifically targeting Linux environments.

What distinguishes emp3r0r is its position as one of the first C2 frameworks purpose-built for Linux targets while providing seamless integration with external tools. The comprehensive feature list demonstrates its versatility.

For extensibility, emp3r0r offers complete python3 support via the vaccine module (15MB total), including essential packages like Impacket, Requests, and MySQL. The framework supports diverse module formats including bash, powershell, python, dll, so, and exe.


Features

  • Advanced Command-Line Interface

    • Built on console and cobra frameworks
    • Comprehensive auto-completion with syntax highlighting
    • Multi-tasking capabilities through tmux integration
    • Secure operator-server architecture using WireGuard and mTLS
  • Operational Security

    • Dynamic argv manipulation for process listing obfuscation
    • File and PID concealment through Glibc hijacking (via patcher in get_persistence)
    • Bring Your Own Shell functionality supporting elvish and other interactive programs through custom modules
  • Secure Communications

    • HTTP2/TLS-based command and control
    • UTLS implementation to defeat JA3 fingerprinting
    • KCP-based fast, multiplexed, anonymous UDP tunneling to obfuscate C2 traffic
    • Support for external proxying such as TOR and CDNs
    • Operators connect to C2 using WireGuard and mTLS
  • Memory Forensics Capabilities

    • Cross-platform memory dumping
    • Windows mini-dump extraction compatible with pypykatz
  • Flexible Payload Delivery

  • Network Traversal

    • Automatic agent bridging via Shadowsocks proxy chain for internal network access
    • Reverse proxy capabilities through SSH and KCP tunneling
    • External target access for endpoints unreachable by direct connection
  • Operational Efficiency

    • Parallel command execution for uninterrupted workflow
    • Modular architecture supporting custom extensions
    • In-memory execution for bash, powershell, python, and ELF binaries via CGO ELF loader
  • Enhanced Shell Experience

    • SSH integration with PTY support
    • Windows compatibility with standard SSH clients
  • Additional Capabilities

    • Bettercap integration
    • Multiple persistence mechanisms
    • Comprehensive post-exploitation toolset
    • OpenSSH credential harvesting
    • Advanced Process and Shellcode injection
    • ELF binary patching for persistent access
    • Bidirectional port mapping (TCP/UDP)
    • Agent-side Socks5 proxy with UDP support
    • Privilege escalation tools and suggestions
    • System information collection
    • File management with integrity verification and compression
    • SFTP integration for convenient remote file access
    • Log sanitization utilities
    • Screenshot functionality
    • Anti-analysis capabilities
    • Network connectivity verification