Empire is a PowerShell and Python post-exploitation agent.
 
 
Go to file
enigma0x3 5b9b8c281f Merge pull request #44 from Jack64/patch-1
fix hard-coded event subscription name
2015-08-31 19:00:01 -04:00
data Converted message HMAC from MD5 to SHA1 2015-08-27 18:40:19 -04:00
lib fix hard-coded event subscription name 2015-08-31 15:45:38 +01:00
setup Continued porting native shell commands to WMI replacents in agent core 2015-08-20 14:35:42 -04:00
.gitignore Initial BSidesLV '15 release of v1.0.0 2015-08-05 14:36:39 -04:00
LICENSE Initial BSidesLV '15 release of v1.0.0 2015-08-05 14:36:39 -04:00
README.md Updated citataions and documentation. 2015-08-08 12:06:44 -04:00
changelog Updated changelog and version for 1.2 release. 2015-08-30 15:59:50 -04:00
empire Initial BSidesLV '15 release of v1.0.0 2015-08-05 14:36:39 -04:00

README.md

#Empire

Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployable post-exploitation modules ranging from key loggers to Mimikatz, and adaptable communications to evade network detection, all wrapped up in a usability-focused framework. It premiered at BSidesLV in 2015.

To install, run the ./setup/install.sh script. There's also a quickstart here and full documentation here.

Empire relies heavily on the work from several other projects for its underlying functionality. We have tried to call out a few of those people we've interacted with heavily here and have included author/reference link information in the source of each Empire module as appropriate. If we have failed to improperly cite existing or prior work, please let us know.

Empire is developed by @harmj0y, @sixdub, and @enigma0x3.