Skip to content

Commit 3e72cd6

Browse files
Cx01Nhubbl3Paul Olushilevinnybod
authored
Updated module descriptions (#790)
* Added annotations to module yamls * First batch of C# module descriptions updated * a few more * a few more * Fixed misspellings and formatting * fixed accidental formatting of code block in yamls * reverted the C# yamls formatting changes * additional fixes * Improved descriptions for clipboard_monitor and screenshot modules to be LLM-friendly * Update PersistAutorun.yaml * cleaned up formatting mistakes * updated SA bofs * updated more bof descriptions * Updated descriptions for ps lateral modules * Updated descriptions for management modules * updated module descriptions * complete powershell/collection * update powrshell situational awareness modules * updated powershell privesc * updated mimikatz modules * update powrshell exploitation modules * updated powershell management modules * update mailraider modules * updated powershell persistence modules * fixed formatting * reverted yaml changes * reverted lint and test yaml * added new line to lint-and-test * Updated module descriptions * fixed invoke-downloadfile.yaml * fixed formated string mistakes * run yamlfmt --------- Co-authored-by: hubbl3 <Jake,Krasnov@bc-security.org> Co-authored-by: Paul Olushile <paul.olushile@redseersecurity.com> Co-authored-by: Vince Rose <vrose04@gmail.com>
1 parent 7600d24 commit 3e72cd6

File tree

431 files changed

+4770
-1023
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

431 files changed

+4770
-1023
lines changed

empire/server/modules/bof/injection/SpawnProcess.yaml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,10 @@ authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: Spawns a new sacrificial process in a suspended state. Non-Microsoft
7-
signed binaries are blocked.
8-
software: ''
6+
description: |
7+
Beacon Object File (BOF) that creates a sacrificial process in a suspended state for
8+
process injection techniques. Spawns a Microsoft-signed binary (default: calc.exe) as a child of
9+
a specified parent process (default: explorer.exe) to establish a legitimate process tree.
910
tactics: [TA0002]
1011
techniques: [T1134.004, T1106]
1112
background: false

empire/server/modules/bof/nanodump.yaml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,12 @@ authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: A flexible tool that creates a minidump of the LSASS process.
6+
description: Beacon Object File (BOF) that creates a minidump of the LSASS process
7+
using various evasion techniques to bypass security monitoring. Supports multiple
8+
dumping methods including handle duplication, process forking, snapshot creation,
9+
and seclogon handle leaking. Can generate both valid and invalid signature dumps,
10+
with options for chunked writing and various privilege escalation techniques to
11+
access LSASS memory while avoiding detection.
712
software: ''
813
tactics: [TA0006]
914
techniques: [T1003.001]

empire/server/modules/bof/secinject.yaml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,10 @@ authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: Section Mapping Process Injection (secinject)
6+
description: Beacon Object File (BOF) that performs section mapping process injection
7+
by allocating memory in a target process and mapping PE sections directly into
8+
the remote process memory space. This technique avoids traditional process injection
9+
APIs by manually copying section data and applying proper memory protection flags.
710
software: ''
811
tactics: [TA0004]
912
techniques: [T1055]

empire/server/modules/bof/situational_awareness/adcs_enum.yaml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,11 @@ authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: Enumerate CAs and templates in the AD using Win32 functions.
6+
description: |
7+
Enumerates Active Directory Certificate Services (AD CS) information
8+
using native Win32 API calls to identify enterprise Certificate Authorities (CAs)
9+
and their certificate templates. Serves as an alternative to COM-based enumeration
10+
by invoking low-level Windows API functions directly.
711
software: ''
812
tactics: [TA0043, TA0007]
913
techniques: [T1590.001, T1590.003, T1482, T1106]

empire/server/modules/bof/situational_awareness/adcs_enum_com.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,12 @@
1-
name: adcs_enum
1+
name: adcs_enum_com
22
authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: Enumerate CAs and templates in the AD using ICertConfig COM object.
6+
description: |
7+
Enumerates the Active Directory Certificate Services (AD CS) configuration
8+
in the current domain using the ICertConfig COM interface. Outputs all enterprise
9+
Certificate Authorities (CAs) and their published certificate templates.
710
software: ''
811
tactics: [TA0043, TA0007]
912
techniques: [T1590.001, T1590.003, T1482, T1559.001]

empire/server/modules/bof/situational_awareness/adcs_enum_com2.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,11 @@ authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: Enumerate CAs and templates in the AD using IX509PolicyServerListManager
7-
COM object.
6+
description: |
7+
Enumerates enterprise Certificate Authorities (CAs) and their certificate
8+
templates in Active Directory using the IX509PolicyServerListManager COM interface.
9+
Unlike the ICertConfig-based variant, this method uses a more modern COM interface
10+
associated with AD CS policy management.
811
software: ''
912
tactics: [TA0043, TA0007]
1013
techniques: [T1590.001, T1590.003, T1482, T1559.001]

empire/server/modules/bof/situational_awareness/adv_audit_policies.yaml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,10 @@ authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: Retrieve advanced security audit policies.
6+
description: |
7+
Retrieves advanced security audit policy settings from the target system
8+
using native Windows APIs. Useful for identifying which event types are being
9+
logged, including process creation, logon events, and privilege use.
710
software: ''
811
tactics: [TA0007, TA0043]
912
techniques: [T1615, T1592.002, T1012]

empire/server/modules/bof/situational_awareness/arp.yaml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,10 @@ authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: List ARP table.
6+
description: |
7+
Lists the local Address Resolution Protocol (ARP) table to reveal IP-to-MAC
8+
address mappings. Useful for identifying other hosts on the same subnet and gathering
9+
network reconnaissance data.
710
software: ''
811
tactics: [TA0007]
912
techniques: [T1016, T1018, T1106]

empire/server/modules/bof/situational_awareness/cacls.yaml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,10 @@ authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: Display access control lists on specificed files. If a folder enumerates
7-
recursively
6+
description: |
7+
Displays access control lists (ACLs) for a specified file or directory.
8+
If a folder is provided, permissions are enumerated recursively to identify access
9+
rights across all nested items.
810
software: ''
911
tactics: [TA0007]
1012
techniques: [T1083, T1106]

empire/server/modules/bof/situational_awareness/driversigs.yaml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,10 @@ authors:
33
- name: Anthony Rose
44
handle: '@Cx01N'
55
link: https://twitter.com/Cx01N_
6-
description: Enumerate installed services Imagepaths to check the signing cert against
7-
known AV/EDR vendors.
6+
description: |
7+
Enumerates installed service image paths and checks their code signing
8+
certificates against known AV and EDR vendors. Useful for detecting security
9+
products and assessing defensive tooling present on the host.
810
software: ''
911
tactics: [TA0007, TA0009]
1012
techniques: [T1005, T1518.001, T1652]

0 commit comments

Comments
 (0)