sliver v1.0 beta releases: general purpose cross-platform implant framework
Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server. Sliver supports multiple callback protocols including DNS, TCP, and HTTP(S) to make egress simple, even when those pesky blue teams block your domains. You can even have multiple operators (players) simultaneously commanding your sliver army.
It supports proxy-aware C2 over both HTTP and HTTPS, however, since Sliver does not rely upon the SSL/TLS layer for security these protocols are considered somewhat synonymous.
The server, client, and implant all support MacOS, Windows, and Linux (and possibly every Golang compiler target but we’ve not tested them all).
- Dynamic code generation
- Compile-time obfuscation
- Local and remote process injection
- Secure C2 over mTLS, HTTP(S), and DNS
- Windows process migration
- Windows user token manipulation
- Procedurally generated C2 over HTTP (work in progress)
- Let’s Encrypt integration
- In-memory .NET assembly execution
- DNS Canary Blue Team Detection
Changelog v1.0 beta
Too many changes to list, but the largest change in this release is the switch to gRPC for client<->server interactions. There’s also been a lot of under-the-hood cleanups and refactoring to make way for future improvements, better testing, and new features
Copyright (C) 2019 BishopFox