Veil-Framework is defined in Ryan Gandrud’s blog as,
For ethical hackers, evading AV software is a significant detail of success. If an anti-virus program is alerted of an attack, there is a higher likelihood of presenting further weaknesses. Even more, the execution itself would be pointless due to the exploit’s detectability.
- git clone https://github.com/Veil-Framework/Veil-Evasion.git
- cd Veil-Evasion/setup/
- ./setup.sh
- Input Y when prompted
- Follow Python installation prompts – choose yes when asked about overwriting files
- Continue to follow the installation prompts until finished
- To run Veil-Evasion, type: ./Veil-Evasion.py
The available commands included in Veil:
- use – “use a specific payload”
- info – “information on a specific payload”
- list – “list available payloads”
- update – “update Veil to the latest version”
- clean – “clean out payload folders”
- checkvt – “check payload hashes vs. VirusTotal”
- exit – “exit Veil”