Bc security releases empire 6.3.0 framework

Bc Security has launched Empire 6.3.0, an updated open-source tool for post-exploitation and adversary emulation. The release enhances capabilities for red teams and penetration testers through improved agent support and evasion techniques. It maintains a modular Python 3 architecture to simulate real-world attacks securely.

On December 13, 2025, BC Security announced the release of Empire 6.3.0, the latest version of its open-source post-exploitation and adversary emulation framework. Designed for red teams and penetration testers, the tool provides a modular and scalable platform to simulate attack scenarios and test defenses.

Empire operates on a server/client model written in Python 3, supporting multiplayer engagements with fully encrypted communications. This allows multiple operators to collaborate while ensuring operational security. The framework includes a built-in client for remote access and integrates Starkiller, a GUI tool now bundled as a Git submodule, offering a web-based interface for managing operations via the API.

A major update in version 6.3.0 is expanded agent compatibility, supporting PowerShell, Python 3, C#, Go, and IronPython 3 agents. This enables deployment across diverse systems, including those restricting interpreted languages. The library features over 400 modules, such as Mimikatz for credential theft, Seatbelt for reconnaissance, Rubeus and Certify for privilege escalation, and SharpSploit for process injection. Operators can extend functionality through a custom plugin interface and use the integrated Roslyn compiler for C# assemblies.

Security evasion is bolstered with obfuscation frameworks like ConfuserEx 2 and Invoke-Obfuscation to mask payloads from antivirus and EDR solutions. It incorporates JA3/S and JARM evasion to avoid TLS fingerprinting, Donut for command-line shellcode generation, and in-memory .NET execution to reduce disk artifacts.

Installation is straightforward, compatible with Docker, Kali Linux, ParrotOS, Ubuntu, and Debian. Empire aligns with the MITRE ATT&CK framework, aiding teams in mapping behaviors to adversary techniques for accurate threat simulations. This release solidifies Empire's role as a key offensive security platform for ethical hacking and defense testing.

Related Articles

Illustration of Kali Linux 2025.4 release on a hacker's laptop screen, showcasing new tools and updated desktop in a realistic cybersecurity workspace.
Image generated by AI

Kali Linux 2025.4 released with new tools and desktop updates

Reported by AI Image generated by AI

Kali Linux has released version 2025.4 on December 12, 2025, marking its final update of the year. The release introduces three new hacking tools, significant desktop environment improvements, and enhanced support for Kali NetHunter. It focuses on modernizing the user experience for cybersecurity professionals and ethical hackers.

The ParrotOS team has launched version 7.0 of its Debian-based ethical hacking and penetration testing distribution, codenamed Echo. Built on Debian 13 Trixie and Linux kernel 6.12 LTS, it features KDE Plasma as the default desktop environment on Wayland. New tools and RISC-V support highlight the update's focus on security professionals.

Reported by AI

Offensive Security has released Kali Linux 2025.4, updating its penetration testing platform with improved desktop environments and fresh tools. The version focuses on usability across GNOME, KDE Plasma, and XFCE, while adding support for more devices in Kali NetHunter. It also defaults to Wayland for better compatibility.

A deceptive package on the PyPI repository has been found impersonating the popular SymPy library. This malicious software targets Linux systems, downloading and executing the XMRig cryptocurrency miner through in-memory techniques. Security researchers have highlighted the risks posed by such supply chain attacks in open-source ecosystems.

Reported by AI

SUSE has released SUSE Linux Enterprise Server 16, the first enterprise Linux distribution to integrate agentic AI through the Model Context Protocol. This update provides built-in support for connecting AI models to external tools without vendor lock-in, alongside a 16-year lifecycle. The release aims to enhance operational efficiency for mission-critical workloads.

At KubeCon + CloudNativeCon, Red Hat unveiled OpenShift 4.20, a new version of its platform aimed at unifying enterprise IT from legacy virtual machines to AI workloads. The release emphasizes enhanced security, accelerated AI capabilities, and expanded virtualization support. Additional announcements highlight customer efficiencies and open-source advancements.

Reported by AI

Cyber threat actors in Operation Zero Disco have exploited a vulnerability in Cisco's SNMP service to install persistent Linux rootkits on network devices. The campaign targets older Cisco switches and uses crafted packets to achieve remote code execution. Trend Micro researchers disclosed the attacks on October 16, 2025, highlighting risks to unpatched systems.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline