How To

Avoiding Anti-Virus Detection with Veil-Evasion

Veil-Framework is defined in Ryan Gandrud’s blog as,

For ethical hackers, evading AV software is a significant detail of success. If an anti-virus program is alerted of an attack, there is a higher likelihood of presenting further weaknesses. Even more, the execution itself would be pointless due to the exploit’s detectability.

  • git clone https://github.com/Veil-Framework/Veil-Evasion.git
  • cd Veil-Evasion/setup/
  • ./setup.sh
  • Input Y when prompted
  • Follow Python installation prompts – choose yes when asked about overwriting files
  • Continue to follow the installation prompts until finished
  • To run Veil-Evasion, type: ./Veil-Evasion.py
The available commands included in Veil:
  • use – “use a specific payload”
  • info – “information on a specific payload”
  • list – “list available payloads”
  • update – “update Veil to the latest version”
  • clean – “clean out payload folders”
  • checkvt – “check payload hashes vs. VirusTotal”
  • exit – “exit Veil”
To Top

Pin It on Pinterest

Share This