Skip to content

red_empire

Description

Pure Python & PowerShell post-exploitation

Notes

Port 5555 opened for reverse callbacks

Image

empireproject/empire

Categories

  • Offensive

Ports

  • 5555:5555/tcp

Labels

KeyValue
traefik.frontend.rulePathPrefixStrip:/empire
traefik.port5555
traefik.enabletrue
traefik.http.routers.red_empire.ruleHost(`red_empire.{$TRAEFIK_INGRESS_DOMAIN}`)
traefik.http.routers.red_empire.entrypointshttps
traefik.http.services.red_empire.loadbalancer.server.port5555
traefik.http.routers.red_empire.tlstrue
traefik.http.routers.red_empire.tls.certresolverdefault
traefik.http.routers.red_empire.middlewarestraefik-forward-auth
mafl.enabletrue
mafl.titleEmpire
mafl.descriptionPure Python & PowerShell post-exploitation
mafl.linkhttps://red_empire.{$TRAEFIK_INGRESS_DOMAIN}
mafl.icon.wraptrue
mafl.icon.color#007acc
mafl.status.enabledtrue
mafl.status.interval60
mafl.groupOffensive
mafl.icon.urlhttps://i.imgur.com/XvtOqFp.png

Licensed under the MIT License. Free for all use cases. For enterprise or academic support, please reach out to us.