Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Posted on December 13, 2025December 13, 2025 By CWS

BC Safety has introduced the discharge of Empire 6.3.0, the newest iteration of the broadly used post-exploitation and adversary emulation framework.

This replace reinforces Empire’s place as a premier device for Crimson Groups and penetration testers, providing a versatile, modular server structure written in Python 3 together with intensive agent assist.

Unified Structure and Expanded Agent Assist

Empire 6.3.0 continues to streamline operations with its server/shopper structure, designed to assist multiplayer engagements.

The framework permits a number of operators to collaborate seamlessly whereas sustaining totally encrypted communications.

A key spotlight of this launch is the sturdy assist for various agent languages, enabling operators to deploy implants throughout numerous environments.

Function CategoryCapabilities and DetailsSupported AgentsPowerShell, Python 3, C#, IronPython 3, GoEvasion & SecurityJA3/S & JARM Evasion, ConfuserEx 2, Invoke-Obfuscation, Encrypted CommsInstallation SupportDocker, Kali, ParrotOS, Ubuntu 22.04/24.04, Debian 11/12Execution ModulesAssembly Execution, BOF Execution, Mimikatz, Rubeus, SeatbeltCompiler IntegrationIntegrated Roslyn compiler (Covenant) for in-memory .NET executionInterfaceCLI Consumer & Starkiller Net GUI (Git submodule)

The inclusion of Go brokers alongside conventional PowerShell and Python 3 brokers considerably broadens the operational scope, permitting for execution on programs the place interpreted languages is perhaps restricted.

The built-in Starkiller GUI, now packaged as a Git submodule, supplies a contemporary net interface for distant server administration.

This eliminates the necessity for advanced unbiased setups, as Starkiller interfaces instantly with Empire’s API to supply a graphical different to the command-line shopper.

Safety evasion stays a precedence in model 6.3.0. The framework incorporates JA3/S and JARM evasion strategies to mix site visitors profiles and bypass community detection logic.

Set up Quickstart:

bashgit clone –recursive
cd Empire
./setup/checkout-latest-tag.sh
./ps-empire set up -y
./ps-empire server

Moreover, built-in obfuscation instruments like ConfuserEx 2 and Invoke-Obfuscation assist masks payloads from antivirus and EDR options.

The module library now boasts over 400 supported instruments, starting from Mimikatz and Seatbelt to customized C# assemblies compiled by way of the built-in Roslyn compiler.

This modular design permits operators to quickly prolong performance by including customized plugins or using the versatile module interface for brand new instruments.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:6.3.0, Empire, Features, Launches, Penetration, Red, Teams, Testers

Post navigation

Previous Post: CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
Next Post: Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware

Related Posts

Threat Actors Impersonate Fake Docusign Notifications To Steal Corporate Data Cyber Security News
Cisco ISE Vulnerability Let Remote attacker Access Sensitive Data Cyber Security News
Hackers Leverage Multiple Ad Networks to Attack Adroid Users With Triada Malware Cyber Security News
Threat Actors Attack PayPal Users in New Account Profile Set up Scam Cyber Security News
JLR Confirms Phased Restart of Operations Following Cyber Attack Cyber Security News
CodeSign Secure v3.02: Future of Code Signing with PQC Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LLMs Hijacked, Monetized in ‘Operation Bizarre Bazaar’
  • SolarWinds Patches Critical Web Help Desk Vulnerabilities
  • Google Disrupted World’s Largest IPIDEA Residential Proxy Network
  • New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
  • Cyber Insights 2026: Zero Trust and Following the Path

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LLMs Hijacked, Monetized in ‘Operation Bizarre Bazaar’
  • SolarWinds Patches Critical Web Help Desk Vulnerabilities
  • Google Disrupted World’s Largest IPIDEA Residential Proxy Network
  • New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
  • Cyber Insights 2026: Zero Trust and Following the Path

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark