Sliver C2 Framework Tutorial

Complete walkthrough of the Sliver Command & Control framework for red team operations and penetration testing.

YouTube video thumbnail

What is Sliver?

Sliver is an open-source Command & Control (C2) framework developed by BishopFox for red team operations and adversary simulations. It provides a robust platform for post-exploitation activities with strong operational security features.

Topics Covered

  • Installation & Setup: Getting Sliver up and running
  • Implant Generation: Creating Windows, Linux, and macOS payloads
  • Command & Control: Establishing and managing sessions
  • Post-Exploitation: Credential harvesting, lateral movement, persistence
  • Evasion Techniques: AV bypass, process injection, obfuscation
  • Operational Security: OPSEC considerations for real-world engagements

Why Sliver?

  • Modern alternative to Cobalt Strike and Metasploit
  • Built-in support for multiple protocols (HTTP/HTTPS, DNS, mTLS)
  • Active development and community support
  • Free and open-source
  • Strong focus on OPSEC and evasion

Watch the full tutorial above for hands-on demonstrations and practical examples!

Resources