Skip to content

Sec-Fork/conquest

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

351 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Banner

Conquest is a feature-rich, extensible and malleable command & control/post-exploitation framework developed for penetration testing and adversary simulation. Conquest's team server, operator client and agent have all been developed using the Nim programming language and are designed with modularity and flexibility in mind. It features an advanced malleable profile system for customizing network traffic, a multi-user client GUI developed using Dear ImGui and the Monarch agent, an extensible C2 implant aimed at Windows targets.

Conquest Client

Caution

Conquest is designed to be only used for educational purposes, research and authorized security testing of systems that you own or have an explicit permission to attack. The author provides no warranty and accepts no liability for misuse.

Getting Started

The Conquest team server and operator client are currently meant to be compiled and used on a Ubuntu/Debian-based operating system. For getting the framework up and running, follow the installation instructions.

For more information about architecture, usage and features, check out the documentation!

Features

Conquest Team Server

  • Different listener types: HTTP, SMB
  • Advanced malleable C2 profile system for configuring network traffic (TOML v1.1)
  • Encrypted C2 communication leveraging AES256-GCM and X25519 key exchange
  • Logging of all operator activity
  • Loot management for downloads and screenshots

Operator Client

  • Websocket-based GUI developed using Dear ImGui
  • Multi-client support and password-based user authentication
  • Flexible payload generation with module selection
  • File and process browser components
  • Console history and auto-complete for agent commands
  • Extensible Python Scripting API for creating commands and modules
  • Battle-tested module ecosystem

Monarch Agent

  • Different payload types: .exe, .dll, .svc.exe
  • Sleep obfuscation via Ekko, Zilean or Foliage with support for call stack spoofing
  • Stable COFF/BOF Loader
  • In-memory execution of .NET assemblies
  • Token manipulation
  • AMSI/ETW patching via hardware breakpoints
  • Compile-time string obfuscation
  • Self-destruct functionality
  • Agent kill date & working hours

Screenshots

Payload generation

Filesystem Browser

Screenshot Preview

Acknowledgements

The following projects and people have significantly inspired and/or helped with the development of this framework.

About

Conquest is a feature-rich and malleable command & control/post-exploitation framework developed in Nim.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Nim 69.2%
  • C 29.2%
  • C++ 1.6%