Sliver
Featured💥 Exploitation · Go
Sliver is an open-source cross-platform adversary emulation and red team framework developed by BishopFox. It supports C2 over mTLS, HTTP(S), DNS, and WireGuard, with implants that can be compiled for Windows, macOS, and Linux. Sliver supports multiple operators simultaneously, making it ideal for team engagements. It includes features like process injection, pivoting, staged/stageless payloads, and a robust extension system.
Use Cases
- Red team operations and adversary simulation
- C2 implant generation and management
- Multi-operator team engagements
- Post-exploitation and lateral movement
- Custom payload development
Tags
Details
- Category
- 💥 Exploitation
- Language
- Go
- Repository
- BishopFox/sliver
Platforms
Alternatives & Comparisons
More in Exploitation
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
BloodHound
GoActive Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
CrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Evil-WinRM
RubyUltimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
Covenant
C#.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.