Files
conquest/README.md

61 lines
3.1 KiB
Markdown
Raw Normal View History

2025-10-30 15:35:13 +01:00
![Banner](assets/banner.png)
2025-10-30 17:08:50 +01:00
**Conquest** is a feature-rich, extensible and malleable command & control/post-exploitation framework developed for penetration testing and adversary simulation. Conquest's team server, operator client and agent have all been developed from scratch using the Nim programming language and are designed with modularity and flexibility in mind. It features custom C2 communication via binary packets over HTTP, a client GUI developed using Dear ImGui and the `Monarch` agent, a modular C2 implant aimed at Windows targets.
2025-10-31 12:31:41 +01:00
![Conquest Client](assets/readme-1.png)
2025-10-27 20:44:12 +01:00
2025-10-27 22:26:59 +01:00
> [!CAUTION]
2025-10-27 20:44:12 +01:00
> Conquest is designed to be only used for educational purposes, research and authorized security testing of systems that you own or have an explicit permission to attack. The author provides no warranty and accepts no liability for misuse.
2025-10-27 22:26:59 +01:00
## Getting Started
2025-10-31 11:09:37 +01:00
The Conquest team server and operator client are currently meant to be compiled and used on a Ubuntu/Debian-based operating system. For getting the framework up and running, follow the [installation instructions](./docs/1-INSTALLATION.md).
2025-10-30 15:35:13 +01:00
2025-10-31 11:09:37 +01:00
For more information about architecture, usage and features, check out the [documentation](./docs/README.md)!
2025-10-27 20:44:12 +01:00
## Features
2025-10-31 14:55:50 +01:00
- Flexible operator GUI client developed using Dear ImGui
2025-10-27 20:44:12 +01:00
- HTTP listeners with support for callback hosts (Redirectors)
- Support for malleable C2 profiles (TOML)
- Customizable payload generation
- Encrypted C2 communication leveraging AES256-GCM and X25519 key exchange
- Sleep obfuscation via Ekko, Zilean or Foliage with support for call stack spoofing
2025-10-31 14:55:50 +01:00
- In-memory execution of COFF/BOF files
- In-memory execution of .NET assemblies
2025-10-27 20:44:12 +01:00
- Token impersonation
2025-10-31 14:55:50 +01:00
- AMSI/ETW patching using hardware breakpoints
2025-10-27 20:44:12 +01:00
- Compile-time string obfuscation
- Wide selection of built-in post-exploitation modules
2025-10-31 18:00:57 +01:00
- Looting and loot management (downloads & screenshots)
2025-10-27 20:44:12 +01:00
- Logging of all operator activity
2025-10-30 15:35:13 +01:00
- Self-destruct functionality
2025-10-28 23:02:48 +01:00
- Agent kill date & working hours
2025-10-31 14:55:50 +01:00
- Fully written in Nim
2025-10-27 20:44:12 +01:00
## Screenshots
2025-10-31 12:31:41 +01:00
![Payload generation](assets/readme-2.png)
2025-10-30 15:35:13 +01:00
2025-10-31 12:31:41 +01:00
![Screenshot Preview](assets/readme-3.png)
2025-10-30 15:35:13 +01:00
## Acknowledgements
The following projects and people have significantly inspired and/or helped with the development of this framework.
2025-10-27 20:44:12 +01:00
2025-10-30 15:35:13 +01:00
- Inspiration:
- [Havoc](https://github.com/havocFramework/havoc) by [C5pider](https://github.com/Cracked5pider)
- [Cobalt Strike](https://www.cobaltstrike.com)
- [AdaptixC2](https://github.com/Adaptix-Framework/AdaptixC2/)
- Development:
2025-10-31 16:59:10 +01:00
- [imguin](https://github.com/dinau/imguin) by [dinau](https://github.com/dinau/) (ImGui Wrapper for Nim)
2025-10-30 15:35:13 +01:00
- [MalDev Academy](https://maldevacademy.com/)
- [Creds](https://github.com/S3cur3Th1sSh1t/Creds) by [S3cur3Th1sSh1t](https://github.com/S3cur3Th1sSh1t/)
- [malware](https://github.com/m4ul3r/malware/) by [m4ul3r](https://github.com/m4ul3r/)
- [winim](https://github.com/khchen/winim)
2025-11-17 09:27:13 +01:00
- [OffensiveNim](https://github.com/byt3bl33d3r/OffensiveNim)
2025-10-30 15:35:13 +01:00
- Existing C2's written (partially) in Nim
- [NimPlant](https://github.com/chvancooten/NimPlant)
- [Nimhawk](https://github.com/hdbreaker/Nimhawk)
- [grc2](https://github.com/andreiverse/grc2)
- [Nimbo-C2](https://github.com/itaymigdal/Nimbo-C2)