SkillAgentSearch skills...

Emp3r0r

Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport

Install / Use

/learn @jm33-m0/Emp3r0r

README

<img align="left" width="150" height="150" alt="emp3r0r" src="https://github.com/user-attachments/assets/65550dfb-ea5a-49e8-a036-8c7df349f5f4" />

emp3r0r

Self‑healing Gossip Mesh C2 with Assisted Peer Discovery, Modular Post‑Exploitation, and OPSEC‑Focused Transport

<br clear="all" />

Discord GitHub Sponsors Screenshots

Go Report Card Go Version Tests License GitHub release


<img width="2560" height="1392" alt="image" src="https://github.com/user-attachments/assets/4ce74add-695f-4572-9a19-b6954856c73f" />

What is emp3r0r?

emp3r0r is a comprehensive post-exploitation framework designed from the ground up for Linux environments. While most C2 platforms treat Linux as an afterthought, emp3r0r implements a zero-trust architecture with ephemeral cryptographic identities, perfect forward secrecy, and autonomous mesh networking for penetration testing and red team operations.

What Makes emp3r0r Different?

🔐 Ephemeral TOFU Identity

Agent identities are generated per-session using ECDSA P-256 and lost on restart—no static credentials exist in binaries or on disk. Trust-on-first-use (TOFU) authentication pins the agent's public key on first check-in; subsequent connections must prove possession of the same ephemeral key. Key rotation requires manual operator approval.

Why this matters: Most C2 frameworks embed agent credentials in binaries. If captured, these credentials can be extracted and reused. emp3r0r's ephemeral keys exist only in process memory and are regenerated on every restart.

🔒 Perfect Forward Secrecy for All Communications

Every C2 session uses ECDH key exchange with HKDF-derived session keys. Past traffic remains secure even if long-term keys or agents are compromised. Each session's encryption keys are unique and cannot be derived from other sessions.

Why this matters: Traditional C2s use static encryption keys. If those keys are recovered, historical network captures can be decrypted. emp3r0r's PFS ensures that compromising today's session keys doesn't reveal previous communications.

🕸️ Peer-to-Peer (P2P) Mesh Network

Agents in isolated network segments autonomously discover and tunnel through internet-connected peers via a gossip-based (memberlist) mesh network. The mesh hop transport is pluggable: the default is mtls — camouflage mTLS 1.3 using ephemeral, malleable certificates — with kcp (reliable UDP) also available. All hops are further wrapped in AES-GCM end-to-end encryption.

Why this matters: Manual pivoting requires constant operator intervention and breaks when intermediate hosts fail. emp3r0r's agents automatically form redundant communication paths, ensuring persistence through resilient peer discovery and relay.

🚪 Bring2CC: Reverse Tunneling for Isolated Targets

When agents cannot make outbound connections, Bring2CC reverse-proxies them back to the C2 server using SSH + KCP tunneling. This inverts the connection model: instead of the C2 reaching into the network, isolated targets are tunneled out to the C2 infrastructure.

Why this matters: Traditional C2s fail when egress filtering blocks outbound connections. Bring2CC enables access to air-gapped segments by having internet-connected hosts pull isolated targets out through reverse tunnels.

💾 Memory-Only Operations with Transparent Encryption

Agents use an in-memory filesystem with AES-GCM encryption for all file operations. Bash, PowerShell, Python, and ELF modules execute entirely from memory. Large files automatically spill to encrypted disk storage when memory is exhausted. The agent creates no dedicated directories or persistent configuration files.

Why this matters: EDR and forensic tools rely on disk artifacts for detection and analysis. emp3r0r's memory-first design minimizes disk writes. When disk spillover occurs, all data is encrypted and lacks identifying file extensions or headers.

🧩 Native BOF Support (Cross-Platform)

Execute Windows COFF objects on Windows agents with typed argument packing (LPSTR/LPWSTR/INT/BOOL/BINARY). On Linux, load ELF object files (.o) entirely in-memory with the same modularity. Modules use a standardized schema for cross-platform consistency.

Why this matters: BOFs avoid process creation overhead and are difficult to detect. emp3r0r brings this capability to Linux, where most C2 frameworks rely on forking processes or interpreting shell scripts.

🎭 JA3 Fingerprint Evasion + CBOR Serialization

HTTP2/TLS connections use uTLS to randomize TLS Client Hello fingerprints, preventing static JA3 signature detection. All network traffic and data storage uses CBOR (binary) instead of JSON, reducing bandwidth by 30-40% and avoiding text-based parsing signatures.

Why this matters: Network monitoring tools fingerprint TLS handshakes for application identification. Static TLS implementations create consistent signatures. emp3r0r randomizes these on every connection while using a compact binary protocol that lacks JSON's obvious structure.


Quick Start

Installation

While pre-built binaries may be available, building from source is the primary and recommended installation method:

# Automated install script (Installs dependencies and builds from source)
curl -sSL https://raw.githubusercontent.com/jm33-m0/emp3r0r/refs/heads/v3/install.sh | bash

3-Step Deployment

Initialize the Server

emp3r0r server --c2-hosts 'your.domain.com' --port 12345 --operators 2

This command deploys emp3r0r with:

  • HTTP2/TLS agent listener on a randomized port.
  • WireGuard operator service.
  • Operator mTLS server.

Connect as Operator

Copy the generated connection command and replace <C2_PUBLIC_IP> with your server's IP:

emp3r0r client --c2-port 12345 --server-wg-key 'key...' --c2-host your.domain.com

Generate Agent Payloads

Use the generate command from within the emp3r0r shell interface to create customized agent payloads.


Additional Capabilities

Stealth & Evasion

  • sRDI-like Shellcode Stager: Load ELF binaries from memory without touching disk, similar to sRDI for Windows.
  • Self-suspension & Resumption: Agents can suspend themselves and let the stager manage their memory; the stager rotates XOR-based obfuscation while the agent is idle.
  • Module Stomping: Disguise malicious modules by loading them into the memory space of legitimate system libraries.
  • OPSEC Warnings: Real-time warnings for operations that pose operational security risks (e.g., "fork and run" patterns, unencrypted disk activity).
  • Anti-debug/analysis measures to make inspection harder.

Operator Experience

  • Adaptive tmux UI: Native integration with dynamic status bars, adaptive layouts, and real-time agent/C2 status monitoring.
  • BYOS (Bring Your Own Shell): SSH-based reverse PTY that drives any shell available on the target (bash, zsh, sh, python REPL, etc.) over the same tunnel you also reuse for file manager and transfers.
  • Intelligent auto-completion with syntax highlighting.
  • SFTP integration for efficient remote file operations.

File Transfer System

  • Smart Transfer Strategy: Agents can fetch files from peer agents via encrypted KCP tunnels before falling back to C2, improving speed and stealth.
  • Integrity & Reliability: SHA256 verification plus resumable uploads/downloads so interrupted transfers continue from the last offset.
  • Compression: Zstandard compression reduces bandwidth usage and accelerates transfers.
  • FileServer Module: Agents can host an encrypted HTTP server to share files with other agents, enabling peer-to-peer distribution.

Network Pivoting

  • Flexible Pivoting: Bi-directional TCP/UDP port mapping and agent-side Socks5 (with UDP) support.
  • KCP-based UDP tunneling for speed and resilience in high-latency environments.
  • TOR/CDN support for additional operational cover.

Payload Delivery

  • Advanced Linux Stager: Keeps the agent payload encrypted until execution; auto-restarts with jitter when connectivity requires.
  • Agent-Side Listener: Deploy listeners on compromised hosts to serve payloads internally, bypassing slow C2 connections.
  • Multi-stage delivery for Linux and Windows with ELF/DLL/shellcode options.

Post-Exploitation Arsenal

  • OpenSSH credential harvesting with real-time monitoring (ssh_harvester).
  • Cross-platform memory dumping capabilities (mem_dump).
  • LPE: Privilege escalation tools with automated suggestions (lpe_suggest).
  • Log Sanitization: clean_log module for anti-forensics.

Documentation & Support

Community

Join our Discord server for real-time discussions, technical support, and the latest updates on emp3r0r development.

Resources

  • 📸 [Screenshots and Videos](./Screenshots
View on GitHub
GitHub Stars1.7k
CategoryDevelopment
Updated1d ago
Forks274

Languages

Go

Security Score

100/100

Audited on Mar 20, 2026

No findings