A powerful Linux/Windows post-exploitation framework designed by Linux users, for Linux environments
ssh-harvester-v3.mp4
emp3r0r is a comprehensive post-exploitation framework that stands out as one of the first C2 platforms purpose-built for Linux environments. While most frameworks treat Linux as an afterthought, emp3r0r puts it front and center, delivering robust capabilities for penetration testing and red team operations across both Linux and Windows targets.
- Linux-Native Architecture: Built from the ground up for Linux targets with full Windows compatibility.
- Universal Module Support: Execute Bash, PowerShell, Python, DLL, SO, and EXE modules seamlessly across platforms.
- Advanced Stealth: Memory-backed agent file system with transparent encryption, in-memory module execution, BOF-like modules on both Windows and Linux, advanced Linux stagers, and DLL/Shellcode agents for flexible deployment.
- Modern Infrastructure: WireGuard + mTLS operator authentication, HTTP2/TLS with JA3 fingerprinting evasion, KCP-based UDP tunneling.
- COFF/BOF Loader: Native BOF execution on Windows agents with typed argument packing (LPSTR/LPWSTR/INT/BOOL/BINARY), powered by praetorian-inc/goffloader, and integration-friendly module schema; on Linux you can load ELF object files in-memory to achieve the same effect.
- APT-Grade Connectivity: Auto-Proxy Chain creates a resilient, automatic P2P mesh network. Agents in air-gapped or isolated segments autonomously discover and piggyback on internet-connected peers to reach the C2, ensuring long-term survival in hardened environments.
- Bring2CC: Reverse proxy any target port to the C2 server, enabling direct access to internal resources even when agents cannot make outbound connections.
curl -sSL https://raw.githubusercontent.com/jm33-m0/emp3r0r/refs/heads/v3/install.sh | bashemp3r0r server --c2-hosts 'your.domain.com' --port 12345 --operators 2This command deploys emp3r0r with:
- HTTP2/TLS agent listener on a randomized port.
- WireGuard operator service.
- Operator mTLS server.
Copy the generated connection command and replace <C2_PUBLIC_IP> with your server's IP:
emp3r0r client --c2-port 12345 --server-wg-key 'key...' --c2-host your.domain.comUse the generate command from within the emp3r0r shell interface to create customized agent payloads.
- Memory-first approach with intelligent storage management to minimize disk presence.
- Minimal footprint with no dedicated agent directories or persistent files.
- Warn-before-write for operations that touch disk, keeping hosts clean.
- Consistent artifacts via uniform file handling for predictable, low-profile operations.
- Obfuscated processes and hidden helpers to lower visibility.
- Anti-debug/analysis measures to make inspection harder.
- sRDI-like Shellcode Stager: Load ELF binaries from memory without touching disk, similar to sRDI for Windows.
- Memory-backed Agent Filesystem: Agents use an in-memory file system with transparent encryption for file operations. Large files automatically spill to encrypted disk storage when memory limits are reached, balancing stealth with resource efficiency.
- JA3-evasive HTTP2/TLS (uTLS: Randomizes TLS Client Hello fingerprints to evade JA3-based detection systems
- WireGuard+mTLS for secure operator access.
- KCP for speed and resilience in high-latency environments
- TOR/CDN support for additional operational cover.
- Console + Cobra core for robust command handling.
- Intelligent auto-completion with syntax highlighting.
- Native tmux integration for parallel operations.
- BYOS (Bring Your Own Shell): SSH-based reverse PTY that drives any shell available on the target (bash, zsh, sh, python REPL, etc.) over the same tunnel you also reuse for the file manager and transfers.
- SSH PTY for native terminal experience.
- Windows-compatible with standard OpenSSH clients.
- SFTP integration for efficient remote file operations.
- Bidirectional Transfer: Upload files to agents (
put) and download from agents (get) with intuitive commands. - Recursive Downloads: Download entire directories with
--recursiveflag and filter files using regex patterns (--regex). - Smart Transfer Strategy: Agents can fetch files from peer agents via encrypted KCP tunnels before falling back to C2, improving speed and stealth.
- Integrity & Reliability: SHA256 verification plus resumable uploads/downloads so interrupted transfers continue from the last offset.
- Real-Time Monitoring: Progress bars display transfer speed, completion percentage, and estimated time remaining.
- Compression: Zstandard compression reduces bandwidth usage and accelerates transfers.
- FileServer Module: Agents can host an encrypted HTTP server to share files with other agents, enabling peer-to-peer distribution.
- Security: All transfers occur over HTTP2/TLS connections with lock file protection to prevent concurrent access.
- Automatic P2P Mesh: Agents autonomously form a mesh network using UDP broadcasts and rolling tags. Agents in air-gapped or isolated networks automatically find and tunnel through internet-connected peers (via Shadowsocks), creating a resilient, self-healing command path typical of advanced APT implants.
- Bring2CC: A reverse proxy mechanism (SSH + KCP) that tunnels any port from the agent (or its network) back to the C2 server. This beats the isolation where agents cannot make outbound connections, effectively "bringing" the target to the Command & Control server.
- Flexible Pivoting: Bi-directional TCP/UDP port mapping and agent-side Socks5 (with UDP) support.
- Multi-stage delivery for Linux and Windows with ELF/DLL/shellcode options.
- Windows DLL/shellcode agents for loader-friendly drops; Linux shared-library stager for stealthy starts.
- Built-in listener module supports HTTP, TCP, and UDP protocols for agent-side payload hosting during lateral movement.
- Keeps the agent payload encrypted until the moment of execution, avoiding plaintext on disk.
- Watches the agent and auto-restarts with jitter when connectivity/policy requires, so access recovers without manual action.
- Ships with safe defaults to prevent self-deletion or noisy argv changes when invoked by the stager.
- Supports multiple listener protocols (HTTP/TCP/UDP) via compile-time configuration.
- Deploy listeners on compromised hosts to serve payloads internally, bypassing slow C2 connections.
- Supports
http_aes_compressed,tcp_aes_compressed, andudp_aes_compressedfor encrypted payload delivery. - Ideal for rapid agent propagation within target networks without external communication.
- All modules execute in-memory - Bash, PowerShell, Python, and native ELF modules run directly from the agent's memory-backed file system.
- Execute ELF objects (.o) or executables entirely in memory on Linux targets.
- Memory-only loaders and injection paths eliminate disk artifacts.
- ELF patcher module lets you graft the agent into existing binaries when needed.
- OpenSSH credential harvesting with real-time monitoring (
ssh_harvester). - Cross-platform memory dumping capabilities (
mem_dump). - Windows mini-dump extraction (pypykatz compatible).
- Screenshot: Fully integrated module for capturing target screens.
- LPE: Privilege escalation tools with automated suggestions (
lpe_suggest). - Log Sanitization:
clean_logmodule for anti-forensics.
Join our Discord server for real-time discussions, technical support, and the latest updates on emp3r0r development.
- πΈ Screenshots and Videos
- π Features Overview
- π Security Policy
- π Changelog
- π¦ Module Development (including COFF/BOF)
- Connection stalls: Verify C2 host/WireGuard settings.
- Compatibility: Remove
~/.emp3r0rfor a clean install.
Note: Cross-version compatibility is not guaranteed.
If emp3r0r has proven valuable in your security research and testing, consider supporting its continued development via GitHub Sponsors.