Bc security releases empire 6.3.0 framework

Bc Security has launched Empire 6.3.0, an updated open-source tool for post-exploitation and adversary emulation. The release enhances capabilities for red teams and penetration testers through improved agent support and evasion techniques. It maintains a modular Python 3 architecture to simulate real-world attacks securely.

On December 13, 2025, BC Security announced the release of Empire 6.3.0, the latest version of its open-source post-exploitation and adversary emulation framework. Designed for red teams and penetration testers, the tool provides a modular and scalable platform to simulate attack scenarios and test defenses.

Empire operates on a server/client model written in Python 3, supporting multiplayer engagements with fully encrypted communications. This allows multiple operators to collaborate while ensuring operational security. The framework includes a built-in client for remote access and integrates Starkiller, a GUI tool now bundled as a Git submodule, offering a web-based interface for managing operations via the API.

A major update in version 6.3.0 is expanded agent compatibility, supporting PowerShell, Python 3, C#, Go, and IronPython 3 agents. This enables deployment across diverse systems, including those restricting interpreted languages. The library features over 400 modules, such as Mimikatz for credential theft, Seatbelt for reconnaissance, Rubeus and Certify for privilege escalation, and SharpSploit for process injection. Operators can extend functionality through a custom plugin interface and use the integrated Roslyn compiler for C# assemblies.

Security evasion is bolstered with obfuscation frameworks like ConfuserEx 2 and Invoke-Obfuscation to mask payloads from antivirus and EDR solutions. It incorporates JA3/S and JARM evasion to avoid TLS fingerprinting, Donut for command-line shellcode generation, and in-memory .NET execution to reduce disk artifacts.

Installation is straightforward, compatible with Docker, Kali Linux, ParrotOS, Ubuntu, and Debian. Empire aligns with the MITRE ATT&CK framework, aiding teams in mapping behaviors to adversary techniques for accurate threat simulations. This release solidifies Empire's role as a key offensive security platform for ethical hacking and defense testing.

Relaterede artikler

Illustration of Kali Linux 2025.4 release on a hacker's laptop screen, showcasing new tools and updated desktop in a realistic cybersecurity workspace.
Billede genereret af AI

Kali Linux 2025.4 released with new tools and desktop updates

Rapporteret af AI Billede genereret af AI

Kali Linux has released version 2025.4 on December 12, 2025, marking its final update of the year. The release introduces three new hacking tools, significant desktop environment improvements, and enhanced support for Kali NetHunter. It focuses on modernizing the user experience for cybersecurity professionals and ethical hackers.

A new variant of the SysUpdate malware has been discovered targeting Linux systems, featuring advanced encryption for command-and-control communications. Security researchers at LevelBlue identified the threat during a digital forensics engagement and developed a tool to decrypt its traffic. The malware disguises itself as a legitimate system service to evade detection.

Rapporteret af AI

The ParrotOS team has launched version 7.0 of its Debian-based ethical hacking and penetration testing distribution, codenamed Echo. Built on Debian 13 Trixie and Linux kernel 6.12 LTS, it features KDE Plasma as the default desktop environment on Wayland. New tools and RISC-V support highlight the update's focus on security professionals.

Parrot OS, a Debian-based Linux distribution aimed at ethical hackers and cybersecurity experts, has issued version 7.1. This update, arriving less than two months after the 7.0 release, includes fixes for boot issues and enhancements to security tools. It also introduces new features for running cybersecurity applications via large language models.

Rapporteret af AI

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

OpenAI has launched Codex Security, a new tool designed to identify cyber risks in companies. It promises to detect complex vulnerabilities that other agentic tools overlook. The tool is available to specific ChatGPT customer tiers.

Rapporteret af AI

Veeam has addressed three critical-severity security vulnerabilities that could expose backup servers to remote code execution attacks. The company issued patches to mitigate these risks. The announcement highlights ongoing concerns in cybersecurity for data protection tools.

 

 

 

Dette websted bruger cookies

Vi bruger cookies til analyse for at forbedre vores side. Læs vores privatlivspolitik for mere information.
Afvis