Issue when generating a stager
I am using sliver on a kali VM, I installed it with apt install. Everything works fine, I managed to get session. But when I tried with a stager, I run this command:
generate stager --lhost 10.0.0.8 --lport 8080 --protocol http
And it keeps saying that it's generating for like 15min without giving any output or error.
Anybody had this issue?
Just verified on a fresh Kali installation (2025.1a, HyperV pre-build VM, full apt upgrade)
Installed sliver via curl oneliner (curl https://sliver.sh/install|sudo bash)
Same issue, generating a stager doesn't finish (generate stager --lhost 172.17.117.184 --lport 8443 --arch amd64 --format c --save /tmp)
I'm having the same issue. I even tried building from source and downloading directly from the release page instead of using the install script. It doesn't work any way I try it. Error message is "[!] Error: rpc error: code = Unknown desc = exit status 1 - Please make sure Metasploit framework >= v6.2 is installed and msfvenom/msfconsole are in your PATH"
I verified msfvenom and msfconsole are both in my PATH.
Result of msfconsole --version command is "Framework Version: 6.4.54-dev"
Would really appreciate some guidance on this. Currently bypassing this requires generating the shell code directly from msfvenom, which is workable but also a bit of a pain.
A little additional info, I'm running Kali on bare metal via a Thinkpad T series, architecture is amd64.
Having the same issue unfortunately. Has anybody looked into this yet?
I'm having the same issue. Seems to have gone unnoticed for over a month, so will try to get in the good graces of the devs by giving a full summary of the issue.
Issue
When running generate stager from a Kali VM, it states "Generating payload" but in fact never completes the payload generation. Commands previously worked. Haven't gone any upgrades or version changes of either msfvenom or sliver.
System Info Kali VM running on ARM64
Linux zenkali 6.12.20-arm64 #1 SMP Kali 6.12.20-1kali1 (2025-03-26) aarch64 GNU/Linux
Sliver Version
Installed via apt install sliver in Kali.
[*] Client 1.5.42 - kali - linux/arm64
Compiled at 2024-03-01 03:50:00 -0800 PST
Compiled with go version go1.21.7 linux/arm64
[*] Server v1.5.42 - kali - linux/arm64
Compiled at 2024-03-01 03:50:00 -0800 PST
Command
⠹ Generating stager, please wait ...^C
Sliver Logs
Logs prior to killing process.
INFO[2025-04-29T07:48:24-07:00] [sliver/server/daemon/daemon.go:51] No cli lport, using config file or default value
INFO[2025-04-29T07:48:24-07:00] [sliver/server/daemon/daemon.go:55] Starting Sliver daemon :31337 ...
INFO[2025-04-29T07:48:24-07:00] [sliver/server/transport/mtls.go:52] Starting gRPC listener on :31337
INFO[2025-04-29T07:48:24-07:00] [sliver/server/certs/certs.go:98] Getting certificate ca type = operator, cn = 'server.multiplayer'
INFO[2025-04-29T07:48:24-07:00] [sliver/server/certs/certs.go:98] Getting certificate ca type = operator, cn = 'server.multiplayer'
INFO[2025-04-29T07:48:24-07:00] [google.golang.org/[email protected]/internal/grpclog/grpclog.go:37] [core] [Server #1] Server created
INFO[2025-04-29T07:48:24-07:00] [google.golang.org/[email protected]/internal/grpclog/grpclog.go:37] [core] [Server #1 ListenSocket #2] ListenSocket created
INFO[2025-04-29T07:48:38-07:00] [github.com/grpc-ecosystem/[email protected]/logging/logrus/options.go:220] finished unary call with code OK
INFO[2025-04-29T07:48:56-07:00] [github.com/grpc-ecosystem/[email protected]/logging/logrus/options.go:220] finished unary call with code OK
INFO[2025-04-29T07:49:03-07:00] [sliver/server/msf/msf.go:201] msfvenom [--platform windows --arch x64 --format ps1 --payload windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.5 LPORT=8444 EXITFUNC=thread]
Logs after killing process:
INFO[2025-04-29T08:01:02-07:00] [google.golang.org/[email protected]/internal/grpclog/grpclog.go:37] [transport] [server-transport 0x40001024e0] Closing: EOF
INFO[2025-04-29T08:01:02-07:00] [sliver/server/rpc/rpc-events.go:23] 1 client disconnected
INFO[2025-04-29T08:01:02-07:00] [google.golang.org/[email protected]/internal/grpclog/grpclog.go:37] [transport] [server-transport 0x40001024e0] loopyWriter exiting with error: transport closed by client
INFO[2025-04-29T08:01:02-07:00] [github.com/grpc-ecosystem/[email protected]/logging/logrus/options.go:220] finished streaming call with code OK
WARN[2025-04-29T08:01:02-07:00] [sliver/server/rpc/rpc-tunnel.go:126] Error on stream recv rpc error: code = Canceled desc = context canceled
INFO[2025-04-29T08:01:02-07:00] [github.com/grpc-ecosystem/[email protected]/logging/logrus/options.go:220] finished streaming call with code Canceled
msfvenom
which msfvenom
/usr/bin/msfvenom
Also tried taking the command and running verbatim as in the logs (sans brackets): Truncated for brevity.
msfvenom --platform windows --arch x64 --format ps1 --payload windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.5 LPORT=8444 EXITFUNC=thread
No encoder specified, outputting raw payload
Payload size: 511 bytes
Final size of ps1 file: 2507 bytes
[Byte[]] $buf =
I'm having the same issue. It looks like it's been an issue since #1289 and there have been several reports of it in the past. Something I didn't see mentioned in the other reports is that if you stop the systemd service and start sliver-server manually as root (even in daemon mode), you can generate stagers just fine. It seems to only be a problem when run on Kali AND as a systemd service.
I'll throw my logs onto the pile:
uname
charlie@kali ~> uname -a
Linux kali 6.12.25-amd64 #1 SMP PREEMPT_DYNAMIC Kali 6.12.25-1kali1 (2025-04-30) x86_64 GNU/Linux
standard kali install in a Proxmox VM. Sliver installed earlier today with curl https://sliver.sh/install | sudo bash
Version + client output
charlie@kali ~> sliver
Connecting to localhost:31337 ...
[*] Loaded 3 aliases from disk
[*] Loaded 1 extension(s) from disk
.------..------..------..------..------..------.
|S.--. ||L.--. ||I.--. ||V.--. ||E.--. ||R.--. |
| :/\: || :/\: || (\/) || :(): || (\/) || :(): |
| :\/: || (__) || :\/: || ()() || :\/: || ()() |
| '--'S|| '--'L|| '--'I|| '--'V|| '--'E|| '--'R|
`------'`------'`------'`------'`------'`------'
All hackers gain infect
[*] Server v1.5.43 - e116a5ec3d26e8582348a29cfd251f915ce4a405
[*] Welcome to the sliver shell, please type 'help' for options
sliver > generate stager -f ps1 -L 10.20.20.8
[!] Error: rpc error: code = Unknown desc = exit status 1 - Please make sure Metasploit framework >= v6.2 is installed and msfvenom/msfconsole are in your PATH
Log output
INFO[2025-06-03T22:03:20-07:00] [sliver/server/msf/msf.go:201] msfvenom [--platform windows --arch x64 --format python --payload windows/x64/meterpreter/reverse_tcp LHOST=10.20.20.8 LPORT=8443 EXITFUNC=thread]
INFO[2025-06-03T22:04:13-07:00] [sliver/server/msf/msf.go:208] /usr/bin/msfvenom --platform windows --arch x64 --format python --payload windows/x64/meterpreter/reverse_tcp LHOST=10.20.20.8 LPORT=8443 EXITFUNC=thread
INFO[2025-06-03T22:04:13-07:00] [sliver/server/msf/msf.go:210] --- stdout ---
INFO[2025-06-03T22:04:13-07:00] [sliver/server/msf/msf.go:211] --- stderr ---
<internal:dir>:184:in `open': Too many levels of symbolic links @ dir_initialize - /usr/lib/llvm-19/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Debug+Asserts/build/Debug+Asserts/build/Release/build/Release/build/Release/build/Release/build/Release/build/Debug+Asserts/build/Release/lib/clang/19/include/cuda_wrappers/bits (Errno::ELOOP)
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:in `foreach'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:in `walk'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:60:in `block in walk'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:in `foreach'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:in `walk'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:60:in `block in walk'
<-- this repeated a lot -->
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:in `foreach'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:in `walk'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:38:in `call'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path.rb:93:in `scan!'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path.rb:77:in `entries_and_dirs'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:172:in `block (2 levels) in unshift_paths_locked'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:165:in `reverse_each'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:165:in `block in unshift_paths_locked'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/store.rb:53:in `block in transaction'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/store.rb:52:in `synchronize'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/store.rb:52:in `transaction'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:164:in `unshift_paths_locked'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:113:in `block in unshift_paths'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:113:in `synchronize'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:113:in `unshift_paths'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/change_observer.rb:22:in `unshift'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/railties-7.1.5.1/lib/rails/application.rb:396:in `add_lib_to_load_path!'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/railties-7.1.5.1/lib/rails/application.rb:76:in `inherited'
from /usr/share/metasploit-framework/config/application.rb:37:in `<module:Framework>'
from /usr/share/metasploit-framework/config/application.rb:36:in `<module:Metasploit>'
from /usr/share/metasploit-framework/config/application.rb:35:in `<top (required)>'
from /usr/lib/ruby/3.3.0/bundled_gems.rb:69:in `require'
from /usr/lib/ruby/3.3.0/bundled_gems.rb:69:in `block (2 levels) in replace_require'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/core_ext/kernel_require.rb:30:in `require'
from /usr/share/metasploit-framework/config/environment.rb:2:in `<top (required)>'
from /usr/lib/ruby/3.3.0/bundled_gems.rb:69:in `require'
from /usr/lib/ruby/3.3.0/bundled_gems.rb:69:in `block (2 levels) in replace_require'
from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/core_ext/kernel_require.rb:30:in `require'
from /usr/share/metasploit-framework/lib/msfenv.rb:28:in `<top (required)>'
from <internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:136:in `require'
from <internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:136:in `require'
from /usr/bin/msfvenom:27:in `require_deps'
from /usr/bin/msfvenom:44:in `init_framework'
from /usr/bin/msfvenom:67:in `framework'
from /usr/bin/msfvenom:472:in `<main>'
INFO[2025-06-03T22:04:13-07:00] [sliver/server/msf/msf.go:212] exit status 1
WARN[2025-06-03T22:04:13-07:00] [sliver/server/rpc/rpc-msf.go:197] Error while generating msf payload: exit status 1
ERRO[2025-06-03T22:04:13-07:00] [github.com/grpc-ecosystem/[email protected]/logging/logrus/options.go:224] finished unary call with code Unknown
I tried adding these lines to the service file to try and disable bootsnap but it didn't work
Environment="BOOTSNAP_IGNORE_DIRECTORIES=/usr/lib/llvm-19"
Environment="DISABLE_BOOTSNAP=1"
You can solve this by taking the msfvenom commands in the log, removing the square brackets and then running it in another terminal. That output should still be the staged payload you need.
On Wed, Jun 4, 2025 at 12:55 AM, charlie @.***(mailto:On Wed, Jun 4, 2025 at 12:55 AM, charlie < wrote:
hellocharli left a comment (BishopFox/sliver#1916)
I'm having the same issue. It looks like it's been an issue since #1289 and there have been several reports of it in the past. Something I didn't see mentioned in the other reports is that if you stop the systemd service and start sliver-server manually as root (even in daemon mode), you can generate stagers just fine. It seems to only be a problem when run on Kali AND as a systemd service.
I'll throw my logs onto the pile:
uname
@.*** ~> uname -a Linux kali 6.12.25-amd64 #1 SMP PREEMPT_DYNAMIC Kali 6.12.25-1kali1 (2025-04-30) x86_64 GNU/Linux
standard kali install in a Proxmox VM. Sliver installed earlier today with curl https://sliver.sh/install | sudo bash
Version + client output
@.*** ~> sliver Connecting to localhost:31337 ... [] Loaded 3 aliases from disk [] Loaded 1 extension(s) from disk
.------..------..------..------..------..------. |S.--. ||L.--. ||I.--. ||V.--. ||E.--. ||R.--. | | :/: || :/: || (/) || :(): || (/) || :(): | | :/: || (__) || :/: || ()() || :/: || ()() | | '--'S|| '--'L|| '--'I|| '--'V|| '--'E|| '--'R|
------'------'------'------'------'------'All hackers gain infect [] Server v1.5.43 - e116a5ec3d26e8582348a29cfd251f915ce4a405 [] Welcome to the sliver shell, please type 'help' for options
sliver > generate stager -f ps1 -L 10.20.20.8
[!] Error: rpc error: code = Unknown desc = exit status 1 - Please make sure Metasploit framework >= v6.2 is installed and msfvenom/msfconsole are in your PATH
Log output
INFO[2025-06-03T22:03:20-07:00] [sliver/server/msf/msf.go:201] msfvenom [--platform windows --arch x64 --format python --payload windows/x64/meterpreter/reverse_tcp LHOST=10.20.20.8 LPORT=8443 EXITFUNC=thread] INFO[2025-06-03T22:04:13-07:00] [sliver/server/msf/msf.go:208] /usr/bin/msfvenom --platform windows --arch x64 --format python --payload windows/x64/meterpreter/reverse_tcp LHOST=10.20.20.8 LPORT=8443 EXITFUNC=thread INFO[2025-06-03T22:04:13-07:00] [sliver/server/msf/msf.go:210] --- stdout ---
INFO[2025-06-03T22:04:13-07:00] [sliver/server/msf/msf.go:211] --- stderr --- internal:dir:184:in
open': Too many levels of symbolic links @ dir_initialize - /usr/lib/llvm-19/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Release/build/Debug+Asserts/build/Debug+Asserts/build/Release/build/Release/build/Release/build/Release/build/Release/build/Debug+Asserts/build/Release/lib/clang/19/include/cuda_wrappers/bits (Errno::ELOOP) from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:inforeach' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:inwalk' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:60:inblock in walk' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:inforeach' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:inwalk' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:60:inblock in walk' <-- this repeated a lot --> from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:inforeach' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:50:inwalk' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path_scanner.rb:38:incall' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path.rb:93:inscan!' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/path.rb:77:inentries_and_dirs' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:172:inblock (2 levels) in unshift_paths_locked' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:165:inreverse_each' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:165:inblock in unshift_paths_locked' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/store.rb:53:inblock in transaction' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/store.rb:52:insynchronize' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/store.rb:52:intransaction' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:164:inunshift_paths_locked' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:113:inblock in unshift_paths' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:113:insynchronize' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/cache.rb:113:inunshift_paths' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/change_observer.rb:22:inunshift' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/railties-7.1.5.1/lib/rails/application.rb:396:inadd_lib_to_load_path!' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/railties-7.1.5.1/lib/rails/application.rb:76:ininherited' from /usr/share/metasploit-framework/config/application.rb:37:inmodule:Framework' from /usr/share/metasploit-framework/config/application.rb:36:in<module:Metasploit>' from /usr/share/metasploit-framework/config/application.rb:35:in<top (required)>' from /usr/lib/ruby/3.3.0/bundled_gems.rb:69:inrequire' from /usr/lib/ruby/3.3.0/bundled_gems.rb:69:inblock (2 levels) in replace_require' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/core_ext/kernel_require.rb:30:inrequire' from /usr/share/metasploit-framework/config/environment.rb:2:in<top (required)>' from /usr/lib/ruby/3.3.0/bundled_gems.rb:69:inrequire' from /usr/lib/ruby/3.3.0/bundled_gems.rb:69:inblock (2 levels) in replace_require' from /usr/share/metasploit-framework/vendor/bundle/ruby/3.3.0/gems/bootsnap-1.18.6/lib/bootsnap/load_path_cache/core_ext/kernel_require.rb:30:inrequire' from /usr/share/metasploit-framework/lib/msfenv.rb:28:in<top (required)>' from internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb:136:inrequire' from <internal:/usr/lib/ruby/vendor_ruby/rubygems/core_ext/kernel_require.rb>:136:inrequire' from /usr/bin/msfvenom:27:inrequire_deps' from /usr/bin/msfvenom:44:ininit_framework' from /usr/bin/msfvenom:67:inframework' from /usr/bin/msfvenom:472:in' INFO[2025-06-03T22:04:13-07:00] [sliver/server/msf/msf.go:212] exit status 1 WARN[2025-06-03T22:04:13-07:00] [sliver/server/rpc/rpc-msf.go:197] Error while generating msf payload: exit status 1 ERRO[2025-06-03T22:04:13-07:00] @.***/logging/logrus/options.go:224] finished unary call with code Unknown
I tried adding these lines to the service file to try and disable bootsnap but it didn't work
Environment="BOOTSNAP_IGNORE_DIRECTORIES=/usr/lib/llvm-19" Environment="DISABLE_BOOTSNAP=1"
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you commented.Message ID: @.***>
I was able to fix this by adding these lines to the [service] block of the sliver.service file
InaccessiblePaths=/usr/lib/llvm-18
InaccessiblePaths=/usr/lib/llvm-19
You'd have to add lines for each llvm instance... For my new kali install it was only these two.