“Veil-Framework is a collection of tools that help with information gathering and post-exploitation. One such tool is Veil Evasion which is used for creating payloads that can easily bypass Antivirus using known and documented techniques.”
Veil-Framework’s official website explains,
“Anytime that a professional pen tester, or red teamer, uses a tool on an assessment, your customer is trusting you to not introduce additional vulnerabilities into their network. When you create a backdoor through Veil-Evasion, or any other payload generator, you need to be sure that the payload you are creating connects back to you and only you.”
- git clone https://github.com/Veil-Framework/Veil-Evasion.git
- cd Veil-Evasion/setup/
- ./setup.sh
- Input Y when prompted
- Follow Python installation prompts – choose yes when asked about overwriting files
- Continue to follow the installation prompts until finished
- To run Veil-Evasion, type: ./Veil-Evasion.py
The available commands included in Veil:
- use – “use a specific payload”
- info – “information on a specific payload”
- list – “list available payloads”
- update – “update Veil to the latest version”
- clean – “clean out payload folders”
- checkvt – “check payload hashes vs. VirusTotal”
- exit – “exit Veil”
No comments:
Post a Comment