The Sliver Command & Management (C2) framework, an open-source instrument written in Go, has been a preferred alternative for offensive safety practitioners since its launch in 2020.
Nevertheless, as detection mechanisms evolve, out-of-the-box Sliver payloads are more and more flagged by Endpoint Detection and Response (EDR) options.
Current analysis demonstrates how minor but strategic modifications to the framework’s supply code can considerably improve its evasion capabilities in opposition to fashionable EDR techniques.
Overcoming Static and Behavioral Signatures
Sliver’s main problem lies in its giant binary dimension (as much as 30 MB) and static signatures embedded in its protocol buffer recordsdata, making it susceptible to detection by YARA guidelines.


Researchers started by figuring out these static signatures, equivalent to particular strings within the sliver.proto
file, and changing them with various naming conventions.
As an example, renaming the ScreenshotReq
message to ScShotReq
and propagating the adjustments throughout the framework’s auto-generated recordsdata helped remove a number of static detections.
Moreover, behavioral detections posed a big hurdle.
For instance, Sliver’s default shellcode era relied on Donut’s AMSI bypass, which is closely signatured.
By modifying the supply code to disable this bypass and introducing customized shellcode loaders that map payloads into reminiscence dynamically, researchers had been in a position to evade detection throughout runtime.
Tackling Superior Detection Mechanisms
Regardless of addressing static signatures, sure runtime behaviors triggered alerts in EDR techniques like Elastic Agent.
One such detection concerned Sliver’s use of Go’s LazyDLL
kind, which calls the Home windows API LoadLibraryExW
, leading to alerts for “Community Library Loaded from Unbacked Reminiscence.”
To mitigate this, researchers explored strategies equivalent to module stomping and API hooking however finally opted for easier strategies like writing dynamic libraries to disk with modified export features.


Additional refinements included eradicating unused exported features and renaming key technique calls equivalent to GetJitter
to obfuscate their presence in reminiscence.
In keeping with FortBridge, these adjustments had been automated utilizing scripts that systematically changed problematic strings throughout the codebase, guaranteeing consistency and effectivity throughout compilation.
After implementing these modifications, the personalized Sliver payloads had been subjected to rigorous testing in opposition to a number of EDR options.
Static scans confirmed zero detections, whereas dynamic evaluation by way of sandbox environments like LitterBox confirmed profitable evasion of runtime alerts.
In keeping with the Report, The ultimate payloads demonstrated their effectiveness by establishing callbacks on techniques working Elastic Agent with out triggering any behavioral detections.
This analysis underscores the potential of adapting open-source instruments like Sliver for superior pink staff operations.
By leveraging minor code edits and automation scripts, practitioners can bypass even subtle detection mechanisms with out resorting to constructing customized frameworks from scratch.
Nevertheless, it additionally highlights the continuing arms race between offensive tooling and defensive applied sciences, emphasizing the necessity for steady innovation on each side.
Whereas these findings present precious insights for pink staff operators, additionally they function a reminder for defenders to boost their detection methods past static signatures and predictable behavioral patterns.
Examine Actual-World Malicious Hyperlinks & Phishing Assaults With Menace Intelligence Lookup – Strive for Free