8erg
banner
8erg.bsky.social
8erg
@8erg.bsky.social
🧪 | In The Lab
🧑‍💻 | Cybersecurity Consultant
🥊 | Debugging Life, One Round at a Time
Useful resources:
🔗 Official docs: sliver.sh/docs?name=Ge...
🔗 Other open source C2s: howto.thec2matrix.com
🔗 Installation guide I used:
sliver.sh
July 3, 2025 at 3:47 AM
Key features for those who want the specs:
✅ Multi-platform support (Windows, Linux, macOS)
✅ Multiple transports (HTTP, HTTPS, mTLS, DNS, WireGuard)
✅ Feature extensions via "Armory"
✅ Much more (honestly, I haven't finished experimenting myself 😂)
July 3, 2025 at 3:47 AM
👉 Sliver uses msfvenom (linked to Metasploit) for shellcode generation (I didn't really divorce, keeping my options open... 😂)
👉 By default, implants will be detected by AV - disable Windows Defender for testing
👉 Requires MSF 6.2+
July 3, 2025 at 3:46 AM
I think Sliver is an excellent starting point (experts welcome to suggest others!), especially because it doesn't make you leave your terminal (if you don't like your terminal, you need to quit tech😂).
July 3, 2025 at 3:46 AM
I usually use Metasploit as my command & control in labs. It's effective for beginners, but since I want to learn more sophisticated attacks, the ideal is to use a C2 specifically designed for Red Team operations.
July 3, 2025 at 3:46 AM