[tags]framework,c2c[/tags]
[short_descr]Adversary emulation framework.[/short_descr]
[link] https://github.com/BishopFox/sliver [/link]
[long_descr]
Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys.
Features:
Dynamic code generation
Compile-time obfuscation
Multiplayer-mode
Staged and Stageless payloads
Procedurally generated C2 over HTTP(S)
DNS canary blue team detection
Secure C2 over mTLS, WireGuard, HTTP(S), and DNS
Fully scriptable using JavaScript/TypeScript or Python
Windows process migration, process injection, user token manipulation, etc.
[tags]framework,c2c[/tags] [short_descr]Adversary emulation framework.[/short_descr] [link] https://github.com/BishopFox/sliver [/link] [long_descr] Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. Sliver's implants support C2 over Mutual TLS (mTLS), WireGuard, HTTP(S), and DNS and are dynamically compiled with per-binary asymmetric encryption keys.
Features: