πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
  • Tools
    • AV Evasion
    • Active Directory
    • C2 Frameworks
      • THIS APPLIES TO ALL C2 FRAMEWORKS BUT MAY DIFFER ONLY IN WORDING
      • Reddit C2
      • Cobalt Strike
      • Koadic
      • Powershell Empire
        • Empire Modules quick explanation
        • POWERSHELL EMPIRE C2 FRAMEWORK
        • Modules
          • C2 Operations modules. They perform various activities like file operations (download and upload), c
          • Code Execution modules
          • Empire Exfiltration modules
          • Empire Exploitation Modules
          • Invoke-Obfuscation module
          • Lateral Movement modules
          • Mailraider module for email operations. Used for internal phishing and MS Outlook enumeration.
          • Empire recon modules
          • Trollsploit module
          • Credentials Dumping
          • Data Collection
          • Persistence
          • Privilege Escalation
          • Situational Awareness
      • Sliver
    • Data Manipulation
    • Exploitation Frameworks
    • Fuzzers
    • Miscellaneous
    • Network Scanners
    • Network Sniffers
    • OSINT
    • Password Crackers
    • Phishing Campaigns
    • Scripting Languages
    • Vulnerability Scanners
    • Web Applications
    • Wireless
    • Enumeration
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Toolschevron-right
  2. C2 Frameworkschevron-right
  3. Powershell Empire

Modules

C2 Operations modules. They perform various activities like file operations (download and upload), cchevron-rightCode Execution moduleschevron-rightEmpire Exfiltration moduleschevron-rightEmpire Exploitation Moduleschevron-rightInvoke-Obfuscation modulechevron-rightLateral Movement moduleschevron-rightMailraider module for email operations. Used for internal phishing and MS Outlook enumeration.chevron-rightEmpire recon moduleschevron-rightTrollsploit modulechevron-rightCredentials Dumpingchevron-rightData Collectionchevron-rightPersistencechevron-rightPrivilege Escalationchevron-rightSituational Awarenesschevron-right
PreviousPOWERSHELL EMPIRE C2 FRAMEWORKchevron-leftNextC2 Operations modules. They perform various activities like file operations (download and upload), cchevron-right

Last updated 8 months ago