emp3r0r
MIT๐ฅ Offensive Ops ยท Go
emp3r0r is a Linux-focused Command and Control framework featuring a mesh network architecture where agents can relay through each other. It supports multiple transport protocols including HTTP/2, TLS, and steganography-based communications hidden in images. The framework provides automated post-exploitation including privilege escalation, credential harvesting, keylogging, and file exfiltration. Agents feature self-healing capabilities, process injection, anti-debugging, and containerized execution to avoid detection. The operator interface provides module management, agent tasking, and real-time status monitoring. Designed specifically for Linux environments where other C2 frameworks have limited support.
Installation
$ git clone https://github.com/jm33-m0/emp3r0r.gitUse Cases
- Linux-focused post-exploitation and C2
- Covert communications via steganography
- Mesh networking for resilient agent connectivity
- Automated Linux privilege escalation and persistence
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- Go
- Repository
- jm33-m0/emp3r0r
- License
- MIT
- Platforms
- ๐งlinux
Links
Community Reviews
Alternatives & Comparisons
Sliver
GoOpen-source C2 framework by BishopFox. mTLS, HTTP(S), DNS, WireGuard implants with multi-operator support.
Compare emp3r0r vs SliverMythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Compare emp3r0r vs MythicMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.