Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Posted on December 13, 2025December 13, 2025 By CWS

BC Safety has introduced the discharge of Empire 6.3.0, the newest iteration of the broadly used post-exploitation and adversary emulation framework.

This replace reinforces Empire’s place as a premier device for Crimson Groups and penetration testers, providing a versatile, modular server structure written in Python 3 together with intensive agent assist.

Unified Structure and Expanded Agent Assist

Empire 6.3.0 continues to streamline operations with its server/shopper structure, designed to assist multiplayer engagements.

The framework permits a number of operators to collaborate seamlessly whereas sustaining totally encrypted communications.

A key spotlight of this launch is the sturdy assist for various agent languages, enabling operators to deploy implants throughout numerous environments.

Function CategoryCapabilities and DetailsSupported AgentsPowerShell, Python 3, C#, IronPython 3, GoEvasion & SecurityJA3/S & JARM Evasion, ConfuserEx 2, Invoke-Obfuscation, Encrypted CommsInstallation SupportDocker, Kali, ParrotOS, Ubuntu 22.04/24.04, Debian 11/12Execution ModulesAssembly Execution, BOF Execution, Mimikatz, Rubeus, SeatbeltCompiler IntegrationIntegrated Roslyn compiler (Covenant) for in-memory .NET executionInterfaceCLI Consumer & Starkiller Net GUI (Git submodule)

The inclusion of Go brokers alongside conventional PowerShell and Python 3 brokers considerably broadens the operational scope, permitting for execution on programs the place interpreted languages is perhaps restricted.

The built-in Starkiller GUI, now packaged as a Git submodule, supplies a contemporary net interface for distant server administration.

This eliminates the necessity for advanced unbiased setups, as Starkiller interfaces instantly with Empire’s API to supply a graphical different to the command-line shopper.

Safety evasion stays a precedence in model 6.3.0. The framework incorporates JA3/S and JARM evasion strategies to mix site visitors profiles and bypass community detection logic.

Set up Quickstart:

bashgit clone –recursive
cd Empire
./setup/checkout-latest-tag.sh
./ps-empire set up -y
./ps-empire server

Moreover, built-in obfuscation instruments like ConfuserEx 2 and Invoke-Obfuscation assist masks payloads from antivirus and EDR options.

The module library now boasts over 400 supported instruments, starting from Mimikatz and Seatbelt to customized C# assemblies compiled by way of the built-in Roslyn compiler.

This modular design permits operators to quickly prolong performance by including customized plugins or using the versatile module interface for brand new instruments.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:6.3.0, Empire, Features, Launches, Penetration, Red, Teams, Testers

Post navigation

Previous Post: CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
Next Post: Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware

Related Posts

Massive Data Breach at Cognizant’s TriZetto Affects Millions Massive Data Breach at Cognizant’s TriZetto Affects Millions Cyber Security News
New DroidLock Malware Locks Android Devices and Demands a Ransom New DroidLock Malware Locks Android Devices and Demands a Ransom Cyber Security News
Critical ModSecurity WAF Vulnerability Allows Denial of Service via Empty XML Tags Critical ModSecurity WAF Vulnerability Allows Denial of Service via Empty XML Tags Cyber Security News
Top 3 SOC Bottlenecks and How to Solve Them   Top 3 SOC Bottlenecks and How to Solve Them   Cyber Security News
17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability 17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability Cyber Security News
North Korean Hackers use Code Abuse Tactics for ‘Contagious Interview’ Campaign North Korean Hackers use Code Abuse Tactics for ‘Contagious Interview’ Campaign Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark