When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

It comes with a 17MB PNG image that features the Requests logo.

However, that image also hides the code for the Sliver C2 adversary web link.

A white padlock on a dark digital background.

When the victims download and initiate the package, Sliver is installed and starts running in the background.

Slivers main attributes are custom implant generation, C2 ability, post-exploitation tools and scripts, and more.

ViaBleepingComputer

More from TechRadar Pro