Scripts2026年5月16日·1 分钟阅读

Sliver — Open-Source Adversary Emulation Framework

A cross-platform adversary emulation and red team framework by Bishop Fox, providing implant generation, C2 infrastructure, and post-exploitation capabilities for authorized penetration testing and security assessments.

Agent 就绪

这个资产可以被 Agent 直接读取和安装

TokRepo 同时提供通用 CLI 命令、安装契约、metadata JSON、按适配器生成的安装计划和原始内容链接,方便 Agent 判断适配度、风险和下一步动作。

Needs Confirmation · 64/100策略:需确认
Agent 入口
任意 MCP/CLI Agent
类型
Skill
安装
Single
信任
信任等级:Established
入口
Sliver Overview
通用 CLI 安装命令
npx tokrepo install 61c5c9c0-5121-11f1-9bc6-00163e2b0d79

Introduction

Sliver is an open-source command-and-control (C2) framework developed by Bishop Fox for authorized red team engagements and adversary emulation. It generates cross-platform implants that communicate over multiple protocols (mTLS, WireGuard, HTTP/S, DNS), enabling security teams to simulate real-world attack scenarios and test organizational detection capabilities.

What Sliver Does

  • Generates cross-platform implants for Windows, Linux, and macOS in various formats
  • Provides multiple C2 communication channels including mTLS, WireGuard, HTTP(S), and DNS tunneling
  • Supports multi-operator collaboration with role-based access and audit logging
  • Includes post-exploitation modules for lateral movement, credential harvesting, and persistence
  • Offers both session-based (interactive) and beacon-based (asynchronous callback) implant modes

Architecture Overview

Sliver consists of a server component (the C2 infrastructure) and generated implants (clients). The server is a single Go binary that manages listeners, implant connections, and operator sessions. Implants are compiled per-engagement with unique cryptographic keys and configurable communication parameters. The server exposes a gRPC API that powers both the interactive console and third-party integrations. Armory provides a package manager for community-contributed extensions and BOFs.

Self-Hosting & Configuration

  • Install the server binary on a dedicated host; supports Linux, macOS, and Windows
  • Generate operator configuration files to distribute secure console access to team members
  • Configure listeners on multiple ports and protocols for implant communication diversity
  • Use the Armory package manager to install community extensions and Beacon Object Files
  • Deploy redirectors and CDN fronting for covert C2 channels in adversary simulations

Key Features

  • Multi-protocol C2 (mTLS, WireGuard, HTTP/S, DNS) with automatic failover between channels
  • Implant obfuscation with per-build unique encryption keys and configurable evasion techniques
  • Multi-operator support with gRPC-based API for team collaboration and automation
  • Beacon mode for low-and-slow operations with configurable jitter and callback intervals
  • Armory extension ecosystem for BOFs, .NET assemblies, and third-party tooling integration

Comparison with Similar Tools

  • Cobalt Strike — industry-standard commercial C2 with Malleable C2 profiles; Sliver is free, open-source, and actively maintained
  • Metasploit — exploitation framework focused on initial access; Sliver focuses on post-exploitation C2 and long-term operations
  • Mythic — modular C2 with agent plugins; Sliver provides a more integrated experience with built-in implant generation
  • Havoc — newer C2 framework with modern evasion; Sliver has broader community adoption and more mature multi-operator workflows

FAQ

Q: Is Sliver only for offensive security professionals? A: Sliver is designed for authorized security testing, red team engagements, and adversary emulation exercises. Unauthorized use is illegal.

Q: How does Sliver handle implant detection by antivirus? A: Each implant is uniquely compiled with different encryption keys and optional obfuscation. The Go-based implants have naturally lower detection rates than common C2 frameworks.

Q: Can multiple operators use the same Sliver server? A: Yes. Sliver supports multi-player mode where multiple operators connect to the same server with individual credentials and audit trails.

Q: Does Sliver support staging and payload delivery? A: Yes. Sliver supports staged and stageless payloads, shellcode generation, and integration with initial access tools for payload delivery.

Sources

讨论

登录后参与讨论。
还没有评论,来写第一条吧。

相关资产