Covenant
Covenant is a collaborative .NET C2 framework for red teamers. (by cobbr)
Empire
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. (by BC-SECURITY)
Covenant | Empire | |
---|---|---|
10 | 8 | |
4,326 | 4,441 | |
1.0% | 1.7% | |
0.0 | 8.4 | |
8 months ago | 1 day ago | |
C# | PowerShell | |
GNU General Public License v3.0 only | BSD 3-clause "New" or "Revised" License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Covenant
Posts with mentions or reviews of Covenant.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-11-27.
-
Effective Adversary Emulation
Covenant C2: https://github.com/cobbr/Covenant
-
Secure authentication over unencrypted connection
E.g., https://github.com/cobbr/Covenant/blob/master/Covenant/Data/Grunt/GruntHTTP/GruntHTTP.cs
- Next stage of training
-
Covenant Framework and .NET framework issues
And I have then installed Covenant as per the instructions here: https://github.com/cobbr/Covenant/wiki/Installation-And-Startup
-
A question about internal(network?) pentesting.
https://github.com/cobbr/Covenant https://bloodhoundgang.herokuapp.com/ https://github.com/cobbr/Covenant/wiki
-
Ask HN: Ever lost your love for coding? How did you get it back?
1. Learn to build things
2. Learn to hack them
3. Build tools to hack things (or learn existing ones, e.g. https://github.com/GhostPack and https://github.com/cobbr/Covenant for you .NET folks)
Going from business apps to tools offers a nice change of pace.
-
Guidance on certs in Cybersecurity Field
Covenant: https://github.com/cobbr/Covenant
-
"Modern" Pentest Frameworks
Thanks I will give the README a read https://github.com/cobbr/Covenant
- Microsoft / Github should stop treating open-source software as malware and forcing developers to pay for certificates, if they actually care about open-source developers
-
DomainBorrowing: Not be confused with DomainFronting - This talk presents a new method to hide C2 traffic via a CDN to circumvent censorship. It details some tricks discovered in some CDN implementations, and how to chain them together to “borrow” a domain and its valid HTTPS certificate
an implementation is here - Covenant Implant Template, which uses Domain Borrowing for C2 communication. https://github.com/Dliv3/DomainBorrowing
Empire
Posts with mentions or reviews of Empire.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-04-03.
- Opinion on best c2 to learn for resume (open sourced)
-
Why doesn't Empire start??
Is the new version. The original Empire one was discontinued Old: https://github.com/EmpireProject/Empire New: https://github.com/BC-SECURITY/Empire
-
C/C++/C# for Red team
C# for Windows, EDR bypassing. Windows API and native API calls, undocumented API calls and similar. Look at things like this blog here https://www.inversecos.com/2022/03/windows-event-log-evasion-via-native.html and other resources such as the Windows Internals. Sektor7 would be good with their AV bypass courses, but I have only heard of reviews being good, but not done the courses so DYOR. Try the PentesterAcademy courses on Windows. PowerShell pentesting. Frameworks like Empire in Kali, https://www.kali.org/tools/powershell-empire/ && https://github.com/BC-SECURITY/Empire
-
Using Empire4 without Kali
First of all, Empire4 is a post-exploitation framework, such as Cobalt Strike, Covenant or Meterpreter. It actually rely a lot on Meterpreter, as I will explain later. This means it allows you to deploy listeners in your server and configure attacks connected to them. Empire itself was active for so many years and became deprecated, then Empire4 came up using updated resources. It's open source and it's used for both threat actors (cybercriminals) and offensive security auditors, as well as students of course.
-
Guidance on certs in Cybersecurity Field
Empire: https://github.com/BC-SECURITY/Empire/
-
If Empire made a comeback....
Unless I am mistaken it is being maintained here by another team. They are also working on a frontend for it called Starkiller. https://github.com/BC-SECURITY/Empire
-
"Modern" Pentest Frameworks
Metasploit and Merlin are the larger post-exploitation frameworks that come to mind. As an FYI there's a forked version of Empire now actively in development too - https://github.com/BC-SECURITY/Empire.
- BC-SECURITY/Empire - Empire is a PowerShell and Python 3.x post-exploitation framework.
What are some alternatives?
When comparing Covenant and Empire you can also consider the following projects:
Metasploit - Metasploit Framework
PoshC2 - A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Empire - Empire is a PowerShell and Python post-exploitation agent.
caldera - Automated Adversary Emulation Platform
SILENTTRINITY - An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
empire-db - Mirror of Apache Empire-db