Affected by GO-2024-2993
and 5 other vulnerabilities
GO-2024-2993: Sliver Allows Authenticated Operator-to-Server Remote Code Execution in github.com/bishopfox/sliver
GO-2026-4280: Sliver Vulnerable to Pre-Auth Memory Exhaustion via NoEncoder Bypass in github.com/bishopfox/sliver
GO-2026-4466: Sliver has DNS C2 OTP Bypass that Allows Unauthenticated Session Flooding and Denial of Service in github.com/bishopfox/sliver
GO-2026-4609: Sliver is Vulnerable to Authenticated Nil-Pointer Dereference through its Handlers in github.com/bishopfox/sliver
GO-2026-4723: Sliver Vulnerable to Authenticated OOM via Memory Exhaustion in mTLS/WireGuard Transports in github.com/bishopfox/sliver
GO-2026-4899: Sliver: Nil Pointer Dereference in tunnelCloseHandler causes panic when a reverse tunnel (rportfwd) close is attempted in github.com/bishopfox/sliver
Xor encodes an arm64 payload using a basic XOR scheme and a small aarch64
decoder stub (prepended) which allocates a RW buffer, decodes into it,
marks it RX, then jumps to the decoded payload. This avoids in-place writes
(W^X-friendly loaders may map the initial shellcode RX).
If key includes a trailing key terminator + payload terminator (3 bytes) that satisfy the
encoder constraints, those are used verbatim.
Note: For large/high-entropy payloads, a 2-byte payload terminator may not exist. In
that case, this implementation falls back to a 4-byte payload terminator.