sliver v1.5.29 releases: general purpose cross-platform implant framework
Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army.
It supports proxy-aware C2 over both HTTP and HTTPS, however, since Sliver does not rely upon the SSL/TLS layer for security these protocols are considered somewhat synonymous.
The server, client, and implant all support MacOS, Windows, and Linux (and possibly every Golang compiler target but we’ve not tested them all).
- Dynamic code generation
- Compile-time obfuscation
- Local and remote process injection
- Secure C2 over mTLS, HTTP(S), and DNS
- Windows process migration
- Windows user token manipulation
- Procedurally generated C2 over HTTP (work in progress)
- Let’s Encrypt integration
- In-memory .NET assembly execution
- DNS Canary Blue Team Detection
- e27e030: Only add cache header to responses that need it (moloch–) #924
- e65629e: Tweak https/tls server compatibility for windows (moloch–) #926
Copyright (C) 2019 BishopFox