Empire

Attack simulator

A post-exploitation and adversary emulation framework used to aid Red Teams and Penetration Testers in testing and simulating complex attacks.

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

GitHub

4k stars
103 watching
580 forks
Language: PowerShell
last commit: 11 days ago
c2empirehacktoberfestredteam-infrastructure

Related projects:

Repository Description Stars
remind101/empire A control layer on top of Amazon EC2 Container Service (ECS) that simplifies deploying and managing container-based microservices architecture 2,688
byt3bl33d3r/deathstar Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs 1,585
threat9/routersploit An exploitation framework designed to aid in the testing of embedded devices' vulnerabilities 12,208
blacklanternsecurity/bbot A multipurpose scanner built to automate reconnaissance, bug bounty, and assembly security testing 5,289
malwaredllc/byob An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence. 8,989
bishopfox/sliver An open source framework for simulating and testing advanced adversarial tactics and techniques in a controlled environment 8,536
qsecure-labs/overlord Automates the creation of Red Teaming infrastructure on cloud providers like AWS and Digital Ocean. 612
its-a-feature/mythic A collaborative, multi-platform red teaming framework with a web-based interface and support for plugins and extensions 3,263
center-for-threat-informed-defense/adversary_emulation_library Provides a collection of plans to test defenses against real-world cyber threats. 1,726
emissary-ingress/emissary An open-source API gateway and load balancer for microservices built on Envoy Proxy. 4,376
projectdiscovery/nuclei A vulnerability scanner built on YAML templates to identify weaknesses in applications and networks. 20,687
activecm/rita-legacy Analyzes network traffic to detect command and control communication behaviors. 2,509
security-onion-solutions/securityonion An integrated security monitoring and threat hunting platform that collects, analyzes, and responds to network traffic data 3,293
darmado/atomic-red-team-c2 A framework for executing and analyzing post-exploitation attacks in a controlled environment 171
liamg/traitor A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems 6,689