Skip to content

Kitsune-Sec/sliver

Repository files navigation

Sliver

Sliver

⚠️ Warning: Sliver is currently in alpha, you've been warned :) and please consider contributing

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled with unique X.509 certificates signed by a per-instance certificate authority generated when you first run the binary.

Features

  • Dynamic code generation
  • Compile-time obfuscation
  • Local and remote process injection
  • Anti-anti-anti-forensics
  • Secure C2 over mTLS, HTTP(S), and DNS
  • Windows process migration
  • Windows user token manipulation
  • Multiplayer-mode
  • Procedurally generated C2 over HTTP
  • Let's Encrypt integration
  • In-memory .NET assembly execution

Getting Started

Download the latest release and see the Sliver wiki for a quick tutorial on basic setup and usage.

Compile From Source

Do a git clone of the Sliver repo into your local $GOPATH/github.com/bishopfox/sliver and then run the build.py script (requires Docker), or for details see the wiki.

Source Code

The source code repo contains the following directories:

  • assets/ - Static assets that are embedded into the server binary, generated by go-assets.sh
  • client/ - Client code, the majority of this code is also used by the server
  • protobuf/ - Protobuf code
  • server/ - Server-side code
  • sliver/ - Implant code, rendered by the server at runtime
  • util/ - Utility functions that may be shared by the server and client

License - GPLv3

Sliver is licesed under GPLv3, some subcomponets have seperate licenses. See their respective subdirectories in this project for details.

About

Adversary Emulation Framework

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 98.9%
  • Shell 0.4%
  • Makefile 0.3%
  • Rust 0.1%
  • Python 0.1%
  • Dockerfile 0.1%
  • C 0.1%