
Sliver C2 Cheatsheet
A complete and practical cheatsheet for Sliver, the open-source Command and Control (C2) framework used by red teams and penetration testers for secure post-exploitation, beaconing, and multi-platform payload delivery.
What is Sliver?
Sliver is an advanced open-source Command and Control (C2) framework developed for red team operations, adversary simulation, and stealthy post-exploitation. Designed for security professionals, it supports multi-platform implants (Windows, Linux, macOS), encrypted C2 channels (mTLS, HTTP(S), DNS, WireGuard), and modern tooling that rivals commercial solutions.
Sliver enables operators to:
- Generate flexible implants across multiple OS and architectures
- Establish secure connections with encrypted traffic
- Execute real-time or delayed tasks using session or beacon implants
- Maintain stealth and persistence in complex network environments
Its modular structure, built-in scripting, and RPC interface make Sliver an essential part of any modern red team toolkit.
Sliver is a powerful command and control (C2) framework designed to provide advanced capabilities for covertly managing and controlling remote systems. With Sliver, security professionals, red teams, and penetration testers can easily establish a secure and reliable communication channel over Mutual TLS, HTTP(S), DNS, or Wireguard with target machines. Enabling them to execute commands, gather information, and perform various post-exploitation activities. The framework offers a user-friendly console interface, extensive functionality, and support for multiple operating systems as well as multiple CPU architectures, making it an indispensable tool for conducting comprehensive offensive security operations. (Taken from Sliver Wiki)
Resources
Starting Listeners
Use the following commands to start listeners on your Sliver server:
Generating Implants
Sliver implants offer two communication modes: sessions and beacons, each designed for different operational needs in red team engagements and post-exploitation scenarios.
Understanding Sessions vs. Beacons
Sliver implants support two primary communication modes:
- Session Mode: Establishes a persistent, long-polling TCP connection. This enables immediate execution of commands and real-time interaction, suitable for active engagements.
- Beacon Mode: Designed for stealth operations. The implant checks in at scheduled intervals and sleeps between callbacks. You can configure beacon intervals (e.g., every 6 hours) to reduce detection risk, then switch to a shorter interval for active control.
This flexible implant behavior allows operators to optimize between stealth and responsiveness.
Commands
Highlights:
- Supports
--mtls
,--http
,--dns
,--wg
,--tcp-pivot
, and--named-pipe
C2 protocols - Output formats: Windows PE/DLL/Shellcode, Linux ELF, macOS Mach-O
- Supports advanced flags for evasion, debugging, profiling, and DNS canaries
Post-Exploitation
Help
Last updated on