• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
BC Security - Empire Operations 1

BC Security - Empire Operations 1 2025

No permission to download

BC-Security-Empire-Operations-1.webp

Empire Operations I​

Empire Operations I is an introductory hands-on course with the Empire Post Exploitation Framework. In this course, students will learn the basics of using and operating Empire while being introduced to core red team principles and workflows.

Constents​

Code:
\---BC Security - Empire Operations 1
    |   HTDark.CoM.txt
    |   
    +---1. Introduction
    |       -1. Empire Ops 1.mp4
    |       -2. Notices.pdf
    |       -3. Course Material - Slides.pptx
    |       -4. Immersive Labs.html
    |       -4. Immersive Labs.mp4
    |       -5. Frequently Asked Questions.html
    |       
    +---10. Custom Bypasses
    |   |   -1. Overview of Bypasses.html
    |   |   -1. Overview of Bypasses.mp4
    |   |   -2. Modifying Bypasses.html
    |   |   -2. Modifying Bypasses.mp4
    |   |   -3. AMSI.fail.html
    |   |   -3. AMSI.fail.mp4
    |   |   -4. Bypass Management.html
    |   |   -4. Bypass Management.mp4
    |   |   
    |   \---5. Exercise 5 - Custom Bypasses
    |           -5. Exercise 5 - Custom Bypasses.html
    |           -5. Exercise 5 - Custom Bypasses.mp4
    |           -5. Exercise 5 - Custom Bypasses.vtt
    |           -amsifail-230212-115923.yaml
    |           -example-230212-115922.yaml
    |           
    +---11. Malicious Macros
    |       -1. What are Malicious Macros.html
    |       -2. Macro Stager.html
    |       -2. Macro Stager.mp4
    |       -3. Modifying Macro Stagers.mp4
    |       -3. Modifying Macro Stagers.pdf
    |       -4. Exercise 6 - Macro Stagers.mp4
    |       -4. Exercise 6 - Macro Stagers.pdf
    |       -4. Exercise 6 - Macro Stagers.vtt
    |       
    +---12. Plugin Development
    |       -1. Plugin Overview.pdf
    |       -2. Event-Based Architecture.pdf
    |       -3. Plugins in Practice.html
    |       -4. Exercise 7 - CME Plugin.html
    |       -4. Exercise 7 - CME Plugin.mp4
    |       -4. Exercise 7 - CME Plugin.vtt
    |       
    +---13. Metasploit Integration
    |       -1. Metasploit Framework.html
    |       -2. EternalBlue.pdf
    |       -3. Exercise 8 - EternalBlue Plugin.html
    |       -3. Exercise 8 - EternalBlue Plugin.mp4
    |       -3. Exercise 8 - EternalBlue Plugin.vtt
    |       
    +---14. Capture the Flag (CTF)
    |       -1. Exercise 9 - Capture the Flag.html
    |       
    +---2. Background
    |       -1. What is Command & Control (C2).mp4
    |       -1. What is Command & Control (C2).pdf
    |       -2. C2 Characteristics.html
    |       -2. C2 Characteristics.mp4
    |       -3. What is Empire.html
    |       -3. What is Empire.mp4
    |       
    +---3. Empire Essentials
    |       -1. Overview and Features.html
    |       -1. Overview and Features.mp4
    |       -2. REST API.html
    |       -2. REST API.mp4
    |       -3. Starkiller.html
    |       -3. Starkiller.mp4
    |       -4. Empire Client.html
    |       -5. What are YAMLs.mp4
    |       -5. What are YAMLs.pdf
    |       -6. What are Listeners.html
    |       -6. What are Listeners.mp4
    |       -7. What are Stagers.html
    |       -7. What are Stagers.mp4
    |       -8. What are Agents.html
    |       -8. What are Agents.mp4
    |       -9. Exercise 1 - Server Setup.mp4
    |       -9. Exercise 1 - Server Setup.pdf
    |       -9. Exercise 1 - Server Setup.vtt
    |       
    +---4. Listeners
    |       -1. Overview of Listeners.mp4
    |       -1. Overview of Listeners.pdf
    |       -2. HTTP Listener.html
    |       -2. HTTP Listener.mp4
    |       -3. Additional Listener Options.pdf
    |       -4. HTTP COM Listener.html
    |       
    +---5. Stagers
    |       -1. Overview of Stagers.mp4
    |       -2. Staged vs Stageless.html
    |       -2. Staged vs Stageless.mp4
    |       -3. Staged Payloads in Empire.html
    |       -3. Staged Payloads in Empire.mp4
    |       -4. Multi-Launcher Stager.html
    |       -4. Multi-Launcher Stager.mp4
    |       -5. Executables.html
    |       -5. Executables.mp4
    |       -6. Shellcode.html
    |       -6. Shellcode.mp4
    |       -7. Exercise 2 - Agent Deployment.html
    |       -7. Exercise 2 - Agent Deployment.mp4
    |       -7. Exercise 2 - Agent Deployment.vtt
    |       
    +---6. Agents
    |       -1. Overview of Agents.html
    |       -1. Overview of Agents.mp4
    |       -10. Processes.html
    |       -11. Taskings.html
    |       -12. Agent Settings.html
    |       -13. Sysinfo.html
    |       -2. PowerShell Agent.mp4
    |       -2. PowerShell Agent.pdf
    |       -3. Python Agent.mp4
    |       -3. Python Agent.pdf
    |       -4. C# Agent.html
    |       -4. C# Agent.mp4
    |       -5. IronPython Agent.html
    |       -5. IronPython Agent.mp4
    |       -6. Managing Agents.html
    |       -7. Interacting with Agents.html
    |       -8. Shell Interaction.mp4
    |       -8. Shell Interaction.pdf
    |       -9. File Browser.html
    |       
    +---7. Modules
    |   |   -1. Overview of Modules.html
    |   |   -1. Overview of Modules.mp4
    |   |   -10. Persistence.html
    |   |   -11. Registry Key Persistence.html
    |   |   -12. Scheduled Tasks.html
    |   |   -13. Lateral Movement.pdf
    |   |   -14. PsExec.html
    |   |   -15. PSRemoting.html
    |   |   -16. Credential Harvesting.html
    |   |   -17. Mimikatz.html
    |   |   -18. SharpChromium.html
    |   |   -19. Collection.html
    |   |   -2. Situational Awareness.html
    |   |   -20. Keylogger.html
    |   |   -21. Screenshots.html
    |   |   -22. Code Execution.html
    |   |   -23. Invoke-Shellcode.html
    |   |   -24. Execute Assembly.html
    |   |   -24. Execute Assembly.mp4
    |   |   -25. BOF Execution.html
    |   |   -3. Seatbelt.html
    |   |   -4. Invoke-PortScan.html
    |   |   -5. SauronEye.html
    |   |   -6. Privilege Escalation.pdf
    |   |   -7. UAC Bypass.html
    |   |   -8. Get-System.html
    |   |   -9. SpawnAs.pdf
    |   |   
    |   \---26. Exercise 3 - Module Execution
    |           26. Exercise 3 - Module Execution.html
    |           26. Exercise 3 - Module Execution.mp4
    |           26. Exercise 3 - Module Execution.vtt
    |           whereamix64-230212-115720.o
    |           whoamix64-230212-115718.o
    |           
    +---8. Server Management
    |       -1. Overview of Server Management.mp4
    |       -1. Overview of Server Management.pdf
    |       -10. Settings.html
    |       -11. Plugins.html
    |       -11. Plugins.mp4
    |       -2. Obfuscation.html
    |       -2. Obfuscation.mp4
    |       -3. Invoke-Obfuscation.html
    |       -4. Keyword Obfuscation.html
    |       -4. Keyword Obfuscation.mp4
    |       -5. Pre-Obfuscation.mp4
    |       -5. Pre-Obfuscation.pdf
    |       -6. File Management.html
    |       -6. File Management.mp4
    |       -7. User Management.mp4
    |       -7. User Management.pdf
    |       -8. Module Management.html
    |       -9. Multi-Agent Tasking.mp4
    |       -9. Multi-Agent Tasking.pdf
    |       
    \---9. Network Traffic Customization
        |   -1. Introduction to C2 Communication Customization.html
        |   -1. Introduction to C2 Communication Customization.mp4
        |   -2. Modifying Fields for the Agent.mp4
        |   -2. Modifying Fields for the Agent.pdf
        |   -3. Profile Anatomy.mp4
        |   -3. Profile Anatomy.pdf
        |   -5. Malleable C2.html
        |   -5. Malleable C2.mp4
        |   
        \---4. Exercise 4 - Modifying C2 Data
                4. Exercise 4 - Modifying C2 Data.html
                4. Exercise 4 - Modifying C2 Data.mp4
                4. Exercise 4 - Modifying C2 Data.vtt
                default_comm_profile-230212-115831.pcapng
                modified_comm_profile-230212-115832.pcapng

Information

Free Download for Users PRIV8

Important

Download: htdark.com
Back
Top