^.^;

PowerShell Empire

Post-exploitation framework for Windows environments using PowerShell agents

Active Agents

AGENT_ABC123
WIN10-DESKTOP (192.168.1.100)
user1 @ Windows 10
active
AGENT_XYZ789
WINSERVER2019 (192.168.1.10)
administrator @ Windows Server 2019
active

Modules

Mimikatz
credentials
Extract passwords and hashes from memory
Sherlock
privesc
Find privilege escalation vulnerabilities
Invoke-Kerberoast
credentials
Request service tickets for cracking
Get-DomainUser
situational_awareness
Enumerate domain users
Invoke-BypassUAC
privesc
Bypass User Account Control

Empire Console

╔═══════════════════════════════════════╗
PowerShell Empire v4.10.0
Post-Exploitation Framework
╚═══════════════════════════════════════╝
[+] 2 agent(s) active
[*] Type 'help' for available commands
(Empire: agents) >
Terms of ServiceLicense AgreementPrivacy Policy
Copyright © 2025 JMFG. All rights reserved.