Sliver
FeaturedGPL-3.0๐ฅ Exploitation ยท Go
Sliver is an open-source cross-platform adversary emulation and red team framework developed by BishopFox. It supports C2 over mTLS, HTTP(S), DNS, and WireGuard, with implants that can be compiled for Windows, macOS, and Linux. Sliver supports multiple operators simultaneously, making it ideal for team engagements. It includes features like process injection, pivoting, staged/stageless payloads, and a robust extension system.
Use Cases
- Red team operations and adversary simulation
- C2 implant generation and management
- Multi-operator team engagements
- Post-exploitation and lateral movement
- Custom payload development
Tags
Details
- Category
- ๐ฅ Exploitation
- Language
- Go
- Repository
- BishopFox/sliver
- License
- GPL-3.0
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
Compare Sliver vs Metasploit FrameworkCovenant
C#.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.
Compare Sliver vs CovenantEmpire
PythonPost-exploitation agent built on PowerShell and Python. Cryptologically-secure communications and flexible architecture.
Compare Sliver vs EmpireMythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Compare Sliver vs MythicHavoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Compare Sliver vs HavocMore in Exploitation
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
BloodHound
GoActive Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
CrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Evil-WinRM
RubyUltimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
Covenant
C#.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.