skills/mukul975/anthropic-cybersecurity-skills/building-c2-infrastructure-with-sliver-framework/Socket
building-c2-infrastructure-with-sliver-framework
Fail
Audited by Socket on Apr 13, 2026
1 alert found:
MalwareMalwarereferences/workflows.md
HIGHMalwareHIGH
references/workflows.md
This document is a high-confidence operational playbook for deploying and operating a C2 infrastructure (Sliver) and managing implants for post-exploitation. It provides explicit, actionable guidance to generate and deploy implants, evade detection, and maintain resilient covert channels for remote control and data exfiltration. The artifact itself is not executable code but materially enables severe malicious activity if used against unauthorized targets. Treat any associated code, operator config files, or generated implants as high-risk; protect or remove such artifacts from trusted supply chains and perform in-depth review of any binaries or scripts produced following these instructions.
Confidence: 85%Severity: 95%
Audit Metadata