Esta página se muestra en inglés. Una traducción al español está en curso.
ScriptsMay 16, 2026·3 min de lectura

Sliver — Open-Source Adversary Emulation Framework

A cross-platform adversary emulation and red team framework by Bishop Fox, providing implant generation, C2 infrastructure, and post-exploitation capabilities for authorized penetration testing and security assessments.

Listo para agents

Este activo puede ser leído e instalado directamente por agents

TokRepo expone un comando CLI universal, contrato de instalación, metadata JSON, plan según adaptador y contenido raw para que los agents evalúen compatibilidad, riesgo y próximos pasos.

Needs Confirmation · 64/100Política: confirmar
Superficie agent
Cualquier agent MCP/CLI
Tipo
Skill
Instalación
Single
Confianza
Confianza: Established
Entrada
Sliver Overview
Comando CLI universal
npx tokrepo install 61c5c9c0-5121-11f1-9bc6-00163e2b0d79

Introduction

Sliver is an open-source command-and-control (C2) framework developed by Bishop Fox for authorized red team engagements and adversary emulation. It generates cross-platform implants that communicate over multiple protocols (mTLS, WireGuard, HTTP/S, DNS), enabling security teams to simulate real-world attack scenarios and test organizational detection capabilities.

What Sliver Does

  • Generates cross-platform implants for Windows, Linux, and macOS in various formats
  • Provides multiple C2 communication channels including mTLS, WireGuard, HTTP(S), and DNS tunneling
  • Supports multi-operator collaboration with role-based access and audit logging
  • Includes post-exploitation modules for lateral movement, credential harvesting, and persistence
  • Offers both session-based (interactive) and beacon-based (asynchronous callback) implant modes

Architecture Overview

Sliver consists of a server component (the C2 infrastructure) and generated implants (clients). The server is a single Go binary that manages listeners, implant connections, and operator sessions. Implants are compiled per-engagement with unique cryptographic keys and configurable communication parameters. The server exposes a gRPC API that powers both the interactive console and third-party integrations. Armory provides a package manager for community-contributed extensions and BOFs.

Self-Hosting & Configuration

  • Install the server binary on a dedicated host; supports Linux, macOS, and Windows
  • Generate operator configuration files to distribute secure console access to team members
  • Configure listeners on multiple ports and protocols for implant communication diversity
  • Use the Armory package manager to install community extensions and Beacon Object Files
  • Deploy redirectors and CDN fronting for covert C2 channels in adversary simulations

Key Features

  • Multi-protocol C2 (mTLS, WireGuard, HTTP/S, DNS) with automatic failover between channels
  • Implant obfuscation with per-build unique encryption keys and configurable evasion techniques
  • Multi-operator support with gRPC-based API for team collaboration and automation
  • Beacon mode for low-and-slow operations with configurable jitter and callback intervals
  • Armory extension ecosystem for BOFs, .NET assemblies, and third-party tooling integration

Comparison with Similar Tools

  • Cobalt Strike — industry-standard commercial C2 with Malleable C2 profiles; Sliver is free, open-source, and actively maintained
  • Metasploit — exploitation framework focused on initial access; Sliver focuses on post-exploitation C2 and long-term operations
  • Mythic — modular C2 with agent plugins; Sliver provides a more integrated experience with built-in implant generation
  • Havoc — newer C2 framework with modern evasion; Sliver has broader community adoption and more mature multi-operator workflows

FAQ

Q: Is Sliver only for offensive security professionals? A: Sliver is designed for authorized security testing, red team engagements, and adversary emulation exercises. Unauthorized use is illegal.

Q: How does Sliver handle implant detection by antivirus? A: Each implant is uniquely compiled with different encryption keys and optional obfuscation. The Go-based implants have naturally lower detection rates than common C2 frameworks.

Q: Can multiple operators use the same Sliver server? A: Yes. Sliver supports multi-player mode where multiple operators connect to the same server with individual credentials and audit trails.

Q: Does Sliver support staging and payload delivery? A: Yes. Sliver supports staged and stageless payloads, shellcode generation, and integration with initial access tools for payload delivery.

Sources

Discusión

Inicia sesión para unirte a la discusión.
Aún no hay comentarios. Sé el primero en compartir tus ideas.

Activos relacionados