Sliver is an open-source C2 framework developed by BishopFox, designed as a modern alternative to Cobalt Strike for red team operations. It supports multiple communication protocols — HTTP/S, DNS, mTLS, and WireGuard — and cross-compiles implants for Windows, Linux, and macOS. Sliver is primarily CLI-driven through an interactive console and supports multiplayer mode, allowing multiple operators to connect to a shared server daemon simultaneously. The Sliver daemon is installed and running automatically as a systemd service. A pre-built C2 profile (Documentation Index
Fetch the complete documentation index at: https://mintlify.com/BaddKharma/redStack/llms.txt
Use this file to discover all available pages before exploring further.
redstack) is generated at boot with the correct X-Request-ID token baked in.
The goal here is not to learn Sliver. The objective is to confirm the environment works end-to-end: get a Windows
.exe implant calling back through the redirector. Once you have a callback, the lab is proven functional. For full documentation, see the Sliver wiki.Access the Sliver server
Choose one of the following methods:- Guacamole
- MobaXterm (Windows workstation)
- CLI jumpbox from your host
In the Guacamole portal, click Sliver C2 Server (SSH). This opens a browser-based SSH session directly to the Sliver machine.
Connect to Sliver and create a listener
Start the Sliver client
The Sliver daemon runs as a systemd service and starts automatically on boot. Connect using the pre-configured operator profile:You will land at the
sliver > prompt.Import the C2 profile (first time only)
Import the pre-generated
redstack C2 profile. This only needs to be done once per deployment — Sliver stores the profile in its database:The
redstack profile is generated at boot with your deployment’s X-Request-ID token, a Chrome-style user agent, and realistic HTTP path and file name patterns. After import, it persists in Sliver’s database and does not need to be re-imported after a reconnect.Generate an implant
Generate a Windows executable using theredstack C2 profile. Replace <YOUR_DOMAIN> with your redirector_domain value from terraform.tfvars:
The
/cloud/storage/objects/ URI prefix is stripped by the redirector before forwarding to Sliver. Include it in the callback URL so the redirector can identify and route the traffic.Deploy the implant
Transfer the generated implant to the Windows workstation. Run this from PowerShell on the Windows workstation — thesliver hostname resolves automatically via /etc/hosts:
sliver-training.exe in File Explorer to execute it.
Test the C2 session
Confirm a session appeared
In the Sliver console, list active sessions:A new session should appear within a few seconds of executing the implant.
Interact with the session
Use the session ID to interact with it. You can combine the steps with the Or as two separate commands:
-i flag:C2 profile internals
Theredstack profile is generated by the Sliver setup script at boot using values from your Terraform configuration. The generated file lives at /home/admin/redstack-c2-profile.json on the Sliver server.
View the generated profile
View the generated profile
| Field | Value |
|---|---|
user_agent | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 |
headers | X-Request-ID: <your-token> with 100% send probability |
extensions | js, php, and empty (no extension) |
files | jquery.min, bootstrap, app, main, index, script |
paths | js, assets, scripts, static, dist |
cookies | PHPSESSID |
Generate an additional operator config
Generate an additional operator config
For multiplayer use, generate a new operator config that connects to this Sliver server from another machine:The config is saved to
/root/<operator-name>.cfg. Transfer it to the remote operator’s machine, then run sliver-client with it.Reference
Sliver wiki
Official documentation for the Sliver C2 framework.
Redirector security layers
How the Apache redirector validates headers and routes URI prefixes.
