Empire is a PowerShell and Python post-exploitation agent.
 
 
Go to file
Harmj0y 0d30181baf Added situational_awareness/network/powerview/find_managed_security_groups module
implementing @stufus' recent changes
2015-12-29 15:58:39 -05:00
data Renamed to Find-ManagedSecurityGroups at @harmjoy's request 2015-12-28 17:44:16 +00:00
lib Added situational_awareness/network/powerview/find_managed_security_groups module 2015-12-29 15:58:39 -05:00
setup grammar is stupid 2015-12-01 14:03:41 -05:00
.gitignore Initial BSidesLV '15 release of v1.0.0 2015-08-05 14:36:39 -04:00
LICENSE Initial BSidesLV '15 release of v1.0.0 2015-08-05 14:36:39 -04:00
README.md Updated citataions and documentation. 2015-08-08 12:06:44 -04:00
changelog -Sync of Kevin Robertson's lateral_movement/inveigh_relay module 2015-12-22 15:05:22 -05:00
empire Initial BSidesLV '15 release of v1.0.0 2015-08-05 14:36:39 -04:00

README.md

#Empire

Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework. It premiered at BSidesLV in 2015.

To install, run the ./setup/install.sh script. There's also a quickstart here and full documentation here.

Empire relies heavily on the work from several other projects for its underlying functionality. We have tried to call out a few of those people we've interacted with heavily here and have included author/reference link information in the source of each Empire module as appropriate. If we have failed to improperly cite existing or prior work, please let us know.

Empire is developed by @harmj0y, @sixdub, and @enigma0x3.