Aman Mishra
2025-04-01 16:54:00
gbhackers.com
The Sliver Command & Control (C2) framework, an open-source tool written in Go, has been a popular choice for offensive security practitioners since its release in 2020.
However, as detection mechanisms evolve, out-of-the-box Sliver payloads are increasingly flagged by Endpoint Detection and Response (EDR) solutions.
Recent research demonstrates how minor yet strategic modifications to the framework’s source code can significantly enhance its evasion capabilities against modern EDR systems.
Overcoming Static and Behavioral Signatures
Sliver’s primary challenge lies in its large binary size (up to 30 MB) and static signatures embedded in its protocol buffer files, making it vulnerable to detection by YARA rules.


Researchers began by identifying these static signatures, such as specific strings in the sliver.proto
file, and replacing them with alternative naming conventions.
For instance, renaming the ScreenshotReq
message to ScShotReq
and propagating the changes across the framework’s auto-generated files helped eliminate several static detections.
Additionally, behavioral detections posed a significant hurdle.
For example, Sliver’s default shellcode generation relied on Donut’s AMSI bypass, which is heavily signatured.
By modifying the source code to disable this bypass and introducing custom shellcode loaders that map payloads into memory dynamically, researchers were able to evade detection during runtime.
Tackling Advanced Detection Mechanisms
Despite addressing static signatures, certain runtime behaviors triggered alerts in EDR systems like Elastic Agent.
One such detection involved Sliver’s use of Go’s LazyDLL
type, which calls the Windows API LoadLibraryExW
, resulting in alerts for “Network Library Loaded from Unbacked Memory.”
To mitigate this, researchers explored techniques such as module stomping and API hooking but ultimately opted for simpler methods like writing dynamic libraries to disk with modified export functions.


Further refinements included removing unused exported functions and renaming key method calls such as GetJitter
to obfuscate their presence in memory.
According to FortBridge, these changes were automated using scripts that systematically replaced problematic strings across the codebase, ensuring consistency and efficiency during compilation.
After implementing these modifications, the customized Sliver payloads were subjected to rigorous testing against multiple EDR solutions.
Static scans showed zero detections, while dynamic analysis via sandbox environments like LitterBox confirmed successful evasion of runtime alerts.
According to the Report, The final payloads demonstrated their effectiveness by establishing callbacks on systems running Elastic Agent without triggering any behavioral detections.
This research underscores the potential of adapting open-source tools like Sliver for advanced red team operations.
By leveraging minor code edits and automation scripts, practitioners can bypass even sophisticated detection mechanisms without resorting to building custom frameworks from scratch.
However, it also highlights the ongoing arms race between offensive tooling and defensive technologies, emphasizing the need for continuous innovation on both sides.
While these findings provide valuable insights for red team operators, they also serve as a reminder for defenders to enhance their detection strategies beyond static signatures and predictable behavioral patterns.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free
Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.
Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!
Help Power Techcratic’s Future – Scan To Support
If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.
As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!
BITCOIN bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge Scan the QR code with your crypto wallet app |
DOGECOIN D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA Scan the QR code with your crypto wallet app |
ETHEREUM 0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a Scan the QR code with your crypto wallet app |
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.