Conquest is a feature-rich, extensible and malleable command & control/post-exploitation framework developed for penetration testing and adversary simulation. Conquest's team server, operator client and agent have all been developed from scratch using the Nim programming language and are designed with modularity and flexibility in mind. It features custom C2 communication via binary packets over HTTP, a client GUI developed using Dear ImGui and the Monarch agent, a modular C2 implant aimed at Windows targets.
Caution
Conquest is designed to be only used for educational purposes, research and authorized security testing of systems that you own or have an explicit permission to attack. The author provides no warranty and accepts no liability for misuse.
Getting Started
The Conquest team server and operator client are meant to be compiled and used on a UNIX operating system.
- Install Nim
curl https://nim-lang.org/choosenim/init.sh -sSf | sh
- Build the Conquest team server and client. When first used, these commands download all required dependencies and libraries.
nimble server
nimble client
- Start the team server with a C2 profile.
bin/server -p data/profile.toml
- Start the operator client and connect it to a team server
bin/client [-i <address> (default: localhost)] [-p <port> (default: 37573)]
For more information, check out the docs!
Features
- Flexible operator GUI client written with Dear ImGui in Nim
- HTTP listeners with support for callback hosts (Redirectors)
- Support for malleable C2 profiles (TOML)
- Customizable payload generation
- Encrypted C2 communication leveraging AES256-GCM and X25519 key exchange
- Sleep obfuscation via Ekko, Zilean or Foliage with support for call stack spoofing
- Inline-execution of COFF/BOF files
- Inline-execution of .NET assemblies
- Token impersonation
- AMSI/ETW patch using hardware breakpoints
- Compile-time string obfuscation
- Wide selection of built-in post-exploitation modules
- Looting and loot management
- Logging of all operator activity
- Self-destruct functionality
- Agent kill date & working hours
Screenshots
Acknowledgements
The following projects and people have significantly inspired and/or helped with the development of this framework.
- Inspiration:
- Development:
- imguin by dinau (ImGui Wrapper for Nim)
- MalDev Academy
- Creds by S3cur3Th1sSh1t
- malware by m4ul3r
- winim
- OffensinveNim
- Existing C2's written (partially) in Nim



