
Empire Operations I
Empire Operations I is an introductory hands-on course with the Empire Post Exploitation Framework. In this course, students will learn the basics of using and operating Empire while being introduced to core red team principles and workflows.Constents
Code:
\---BC Security - Empire Operations 1
| HTDark.CoM.txt
|
+---1. Introduction
| -1. Empire Ops 1.mp4
| -2. Notices.pdf
| -3. Course Material - Slides.pptx
| -4. Immersive Labs.html
| -4. Immersive Labs.mp4
| -5. Frequently Asked Questions.html
|
+---10. Custom Bypasses
| | -1. Overview of Bypasses.html
| | -1. Overview of Bypasses.mp4
| | -2. Modifying Bypasses.html
| | -2. Modifying Bypasses.mp4
| | -3. AMSI.fail.html
| | -3. AMSI.fail.mp4
| | -4. Bypass Management.html
| | -4. Bypass Management.mp4
| |
| \---5. Exercise 5 - Custom Bypasses
| -5. Exercise 5 - Custom Bypasses.html
| -5. Exercise 5 - Custom Bypasses.mp4
| -5. Exercise 5 - Custom Bypasses.vtt
| -amsifail-230212-115923.yaml
| -example-230212-115922.yaml
|
+---11. Malicious Macros
| -1. What are Malicious Macros.html
| -2. Macro Stager.html
| -2. Macro Stager.mp4
| -3. Modifying Macro Stagers.mp4
| -3. Modifying Macro Stagers.pdf
| -4. Exercise 6 - Macro Stagers.mp4
| -4. Exercise 6 - Macro Stagers.pdf
| -4. Exercise 6 - Macro Stagers.vtt
|
+---12. Plugin Development
| -1. Plugin Overview.pdf
| -2. Event-Based Architecture.pdf
| -3. Plugins in Practice.html
| -4. Exercise 7 - CME Plugin.html
| -4. Exercise 7 - CME Plugin.mp4
| -4. Exercise 7 - CME Plugin.vtt
|
+---13. Metasploit Integration
| -1. Metasploit Framework.html
| -2. EternalBlue.pdf
| -3. Exercise 8 - EternalBlue Plugin.html
| -3. Exercise 8 - EternalBlue Plugin.mp4
| -3. Exercise 8 - EternalBlue Plugin.vtt
|
+---14. Capture the Flag (CTF)
| -1. Exercise 9 - Capture the Flag.html
|
+---2. Background
| -1. What is Command & Control (C2).mp4
| -1. What is Command & Control (C2).pdf
| -2. C2 Characteristics.html
| -2. C2 Characteristics.mp4
| -3. What is Empire.html
| -3. What is Empire.mp4
|
+---3. Empire Essentials
| -1. Overview and Features.html
| -1. Overview and Features.mp4
| -2. REST API.html
| -2. REST API.mp4
| -3. Starkiller.html
| -3. Starkiller.mp4
| -4. Empire Client.html
| -5. What are YAMLs.mp4
| -5. What are YAMLs.pdf
| -6. What are Listeners.html
| -6. What are Listeners.mp4
| -7. What are Stagers.html
| -7. What are Stagers.mp4
| -8. What are Agents.html
| -8. What are Agents.mp4
| -9. Exercise 1 - Server Setup.mp4
| -9. Exercise 1 - Server Setup.pdf
| -9. Exercise 1 - Server Setup.vtt
|
+---4. Listeners
| -1. Overview of Listeners.mp4
| -1. Overview of Listeners.pdf
| -2. HTTP Listener.html
| -2. HTTP Listener.mp4
| -3. Additional Listener Options.pdf
| -4. HTTP COM Listener.html
|
+---5. Stagers
| -1. Overview of Stagers.mp4
| -2. Staged vs Stageless.html
| -2. Staged vs Stageless.mp4
| -3. Staged Payloads in Empire.html
| -3. Staged Payloads in Empire.mp4
| -4. Multi-Launcher Stager.html
| -4. Multi-Launcher Stager.mp4
| -5. Executables.html
| -5. Executables.mp4
| -6. Shellcode.html
| -6. Shellcode.mp4
| -7. Exercise 2 - Agent Deployment.html
| -7. Exercise 2 - Agent Deployment.mp4
| -7. Exercise 2 - Agent Deployment.vtt
|
+---6. Agents
| -1. Overview of Agents.html
| -1. Overview of Agents.mp4
| -10. Processes.html
| -11. Taskings.html
| -12. Agent Settings.html
| -13. Sysinfo.html
| -2. PowerShell Agent.mp4
| -2. PowerShell Agent.pdf
| -3. Python Agent.mp4
| -3. Python Agent.pdf
| -4. C# Agent.html
| -4. C# Agent.mp4
| -5. IronPython Agent.html
| -5. IronPython Agent.mp4
| -6. Managing Agents.html
| -7. Interacting with Agents.html
| -8. Shell Interaction.mp4
| -8. Shell Interaction.pdf
| -9. File Browser.html
|
+---7. Modules
| | -1. Overview of Modules.html
| | -1. Overview of Modules.mp4
| | -10. Persistence.html
| | -11. Registry Key Persistence.html
| | -12. Scheduled Tasks.html
| | -13. Lateral Movement.pdf
| | -14. PsExec.html
| | -15. PSRemoting.html
| | -16. Credential Harvesting.html
| | -17. Mimikatz.html
| | -18. SharpChromium.html
| | -19. Collection.html
| | -2. Situational Awareness.html
| | -20. Keylogger.html
| | -21. Screenshots.html
| | -22. Code Execution.html
| | -23. Invoke-Shellcode.html
| | -24. Execute Assembly.html
| | -24. Execute Assembly.mp4
| | -25. BOF Execution.html
| | -3. Seatbelt.html
| | -4. Invoke-PortScan.html
| | -5. SauronEye.html
| | -6. Privilege Escalation.pdf
| | -7. UAC Bypass.html
| | -8. Get-System.html
| | -9. SpawnAs.pdf
| |
| \---26. Exercise 3 - Module Execution
| 26. Exercise 3 - Module Execution.html
| 26. Exercise 3 - Module Execution.mp4
| 26. Exercise 3 - Module Execution.vtt
| whereamix64-230212-115720.o
| whoamix64-230212-115718.o
|
+---8. Server Management
| -1. Overview of Server Management.mp4
| -1. Overview of Server Management.pdf
| -10. Settings.html
| -11. Plugins.html
| -11. Plugins.mp4
| -2. Obfuscation.html
| -2. Obfuscation.mp4
| -3. Invoke-Obfuscation.html
| -4. Keyword Obfuscation.html
| -4. Keyword Obfuscation.mp4
| -5. Pre-Obfuscation.mp4
| -5. Pre-Obfuscation.pdf
| -6. File Management.html
| -6. File Management.mp4
| -7. User Management.mp4
| -7. User Management.pdf
| -8. Module Management.html
| -9. Multi-Agent Tasking.mp4
| -9. Multi-Agent Tasking.pdf
|
\---9. Network Traffic Customization
| -1. Introduction to C2 Communication Customization.html
| -1. Introduction to C2 Communication Customization.mp4
| -2. Modifying Fields for the Agent.mp4
| -2. Modifying Fields for the Agent.pdf
| -3. Profile Anatomy.mp4
| -3. Profile Anatomy.pdf
| -5. Malleable C2.html
| -5. Malleable C2.mp4
|
\---4. Exercise 4 - Modifying C2 Data
4. Exercise 4 - Modifying C2 Data.html
4. Exercise 4 - Modifying C2 Data.mp4
4. Exercise 4 - Modifying C2 Data.vtt
default_comm_profile-230212-115831.pcapng
modified_comm_profile-230212-115832.pcapng