External Tor Hidden Service bridge for Sliver C2 (avoiding core modifications) #2126
Otsmane-Ahmed
started this conversation in
Ideas
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi all,
I've been working on a way to easily route Sliver C2 traffic through Tor Hidden Services without needing to modify the core Sliver Go codebase or deal with complex manual Tor configurations.
I built an external Python bridge that automates this process:
https://github.com/Otsmane-Ahmed/sliver-tor-bridge
How it works:
.onionaddress.This allows for fully anonymous C2 infrastructure where the server's real IP is never exposed to the implant, and because it works as an external proxy, it's compatible with any version of Sliver.
I've already submitted it to the Armory (Issue #XX), but wanted to open a discussion here to get feedback on this "external bridge" approach versus native integration.
Is this something commonly needed? Any security concerns I might have missed in the implementation?
Feedback welcome!
Beta Was this translation helpful? Give feedback.
All reactions