The Sliver Command & Management (C2) framework, an open-source device written in Go, has been a well-liked selection for offensive safety practitioners since its launch in 2020.
Nonetheless, as detection mechanisms evolve, out-of-the-box Sliver payloads are more and more flagged by Endpoint Detection and Response (EDR) options.
Latest analysis demonstrates how minor but strategic modifications to the framework’s supply code can considerably improve its evasion capabilities towards trendy EDR methods.
Overcoming Static and Behavioral Signatures
Sliver’s main problem lies in its massive binary measurement (as much as 30 MB) and static signatures embedded in its protocol buffer information, making it susceptible to detection by YARA guidelines.

Researchers started by figuring out these static signatures, similar to particular strings within the sliver.proto
file, and changing them with different naming conventions.
As an example, renaming the ScreenshotReq
message to ScShotReq
and propagating the modifications throughout the framework’s auto-generated information helped eradicate a number of static detections.
Moreover, behavioral detections posed a major hurdle.
For instance, Sliver’s default shellcode era relied on Donut’s AMSI bypass, which is closely signatured.
By modifying the supply code to disable this bypass and introducing customized shellcode loaders that map payloads into reminiscence dynamically, researchers have been capable of evade detection throughout runtime.
Tackling Superior Detection Mechanisms
Regardless of addressing static signatures, sure runtime behaviors triggered alerts in EDR methods like Elastic Agent.
One such detection concerned Sliver’s use of Go’s LazyDLL
sort, which calls the Home windows API LoadLibraryExW
, leading to alerts for “Community Library Loaded from Unbacked Reminiscence.”
To mitigate this, researchers explored strategies similar to module stomping and API hooking however finally opted for less complicated strategies like writing dynamic libraries to disk with modified export features.


Additional refinements included eradicating unused exported features and renaming key methodology calls similar to GetJitter
to obfuscate their presence in reminiscence.
In accordance with FortBridge, these modifications have been automated utilizing scripts that systematically changed problematic strings throughout the codebase, making certain consistency and effectivity throughout compilation.
After implementing these modifications, the personalized Sliver payloads have been subjected to rigorous testing towards a number of EDR options.
Static scans confirmed zero detections, whereas dynamic evaluation by way of sandbox environments like LitterBox confirmed profitable evasion of runtime alerts.
In accordance with the Report, The ultimate payloads demonstrated their effectiveness by establishing callbacks on methods working Elastic Agent with out triggering any behavioral detections.
This analysis underscores the potential of adapting open-source instruments like Sliver for superior purple group operations.
By leveraging minor code edits and automation scripts, practitioners can bypass even subtle detection mechanisms with out resorting to constructing customized frameworks from scratch.
Nonetheless, it additionally highlights the continuing arms race between offensive tooling and defensive applied sciences, emphasizing the necessity for steady innovation on each side.
Whereas these findings present priceless insights for purple group operators, in addition they function a reminder for defenders to boost their detection methods past static signatures and predictable behavioral patterns.
Examine Actual-World Malicious Hyperlinks & Phishing Assaults With Menace Intelligence Lookup – Attempt for Free