Using Empire4 without Kali

This page summarizes the projects mentioned and recommended in the original post on dev.to

InfluxDB high-performance time series database
Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
influxdata.com
featured
CodeRabbit: AI Code Reviews for Developers
Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
coderabbit.ai
featured
  1. Empire

    Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. (by BC-SECURITY)

    First of all, Empire4 is a post-exploitation framework, such as Cobalt Strike, Covenant or Meterpreter. It actually rely a lot on Meterpreter, as I will explain later. This means it allows you to deploy listeners in your server and configure attacks connected to them. Empire itself was active for so many years and became deprecated, then Empire4 came up using updated resources. It's open source and it's used for both threat actors (cybercriminals) and offensive security auditors, as well as students of course.

  2. InfluxDB

    InfluxDB high-performance time series database. Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.

    InfluxDB logo
  3. Poetry

    Python packaging and dependency management made easy

    For configuring it, I decided to use both my VPS and my personal device, since anyway I need to deploy a server and a client instances. Empire4 uses Poetry to launch. Poetry is a tool for dependency management and packaging in Python. Empire uses this library which also deploys under Python3.9. I made sure to install that version (as well as the correspondent pip version). If installing version 3.9 of pip is not working, it use in order to get poetry can be forced through:

  4. Empire

    Empire is a PowerShell and Python 3.x post-exploitation framework. (by terceranexus6)

    Now, I realized that some modules take advantage of msfvenom to work. The msfvenom tool is the Meterpreter payload generator. This is the case of the reverse shell generator. The default configuration of the module distinguish among architechtures but doesn't obfuscate the output in any case. I decided to make some changes in my own fork in order to use SGN encoder with x86 architecture, as you can se bellow in empire/server/stagers/windows/reverseshell.py:

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts

  • Say Hello to UV: A Fast Python Package & Project Manager Written in Rust

    8 projects | dev.to | 17 Apr 2025
  • The Simplest Data Architecture

    5 projects | dev.to | 25 Sep 2024
  • Poetry2Nix Development Flake with Matplotlib GTK Support

    5 projects | dev.to | 11 May 2024
  • Building and deploying a web API powered by ChatGPT

    12 projects | dev.to | 24 May 2023
  • Opinion on best c2 to learn for resume (open sourced)

    1 project | /r/redteamsec | 12 May 2023

Did you know that PowerShell is
the 40th most popular programming language
based on number of references?