![](/style/images/good.png)
![](/style/images/bad.png)
GitHub - BishopFox/sliver: Adversary Emulation Framework
source link: https://github.com/BishopFox/sliver
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Sliver
Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS. Implants are dynamically compiled with unique X.509 certificates signed by a per-instance certificate authority generated when you first run the binary.
The server and client support MacOS, Windows, and Linux. Implants are supported on MacOS, Windows, and Linux (and possibly every Golang compiler target but we've not tested them all).
Features
- Dynamic code generation
- Compile-time obfuscation
- Multiplayer-mode
- Staged and Stageless payloads
- Procedurally generated C2 over HTTP(S)
- DNS canary blue team detection
- Secure C2 over mTLS, WireGuard, HTTP(S), and DNS
- Fully scriptable using JavaScript/TypeScript or Python
- Local and remote process injection
- Windows process migration
- Windows user token manipulation
- Anti-anti-anti-forensics
- Let's Encrypt integration
- In-memory .NET assembly execution
Getting Started
Download the latest release and see the Sliver wiki for a quick tutorial on basic setup and usage. To get the very latest and greatest compile from source.
Linux One Liner
curl https://sliver.sh/install|sudo bash
and then run sliver
Help!
Please checkout the wiki, or start a GitHub discussion. We also tend to hang out in the #golang Slack channel on the Bloodhound Gang server.
Compile From Source
See the wiki.
License - GPLv3
Sliver is licensed under GPLv3, some sub-components may have separate licenses. See their respective subdirectories in this project for details.
Recommend
-
114
CALDERA™ CALDERA™ is a cyber security platform designed to easily automate adversary emulation, assist manual red-teams, and automate incident response. It is built on the MITRE A...
-
49
README.md ...
-
38
Flutter Sliver你要的瀑布流小姐姐今天看...
-
23
README.md Adversary Tactics: PowerShell This course material is no longer maintained and is being provided as-is. Spe...
-
31
Description You just found a Java deserialization bug, you ran all your ysoserial payloads, and.... you got nothing. What n...
-
8
SAP gets the 'full Ellison' as the Oracle CTO names 100 ERP 'defectors' from his oldest adversary
-
25
西瓜视频稳定性治理体系系列文章 卡顿和 ANR 问题一直是 Android 性能优化的重点问题,直接关系到用户体验。当主线程的消息执行耗时过长时,轻则出现不流畅,不跟手,重则有肉眼可见的卡顿感,最严重则是发生 ANR,系统会弹出弹窗提示用户等待或...
-
5
Unredacter Shows you why you should never ever ever use pixelation as a redaction technique. How to Try it Out Install the dependencies: npm install Then start with npm start
-
5
Sliver取代Cobalt Strike成黑客渗透工具“新宠” 作者:yannichen 2022-08-30 10:06:34 安全 微软的一份报告指出,从国家支持的团体到...
-
2
host ip1 ip2 ubuntu(自用) 192.168.130.14 / centos 192.168.130.3 10.0.10.2 ubuntu1
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK