Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.
Veil is current under support by @ChrisTruncer
The following OSs are officially supported:
- Debian 8+
- Kali Linux Rolling 2018.1+
The following OSs are likely able to run Veil:
- Arch Linux
- BlackArch Linux
- Deepin 15+
- Elementary
- Fedora 22+
- Linux Mint
- Parrot Security
- Ubuntu 15.10+
apt -y install veil
veil --setup
NOTE:
- Installation must be done with superuser privileges. If you are not using the root account (as default with Kali Linux), prepend commands with
sudo
or change to the root user before beginning. - Your package manager may be different to
apt
.
sudo apt-get -y install git
git clone https://github.com/Veil-Framework/Veil.git
cd Veil/
./Veil.py --setup
NOTE: Using Py2Exe is recommended over Pyinstaller (as it has a lower detection rate).
Install on a Windows Computer:
Most of the time the config file at /etc/veil/settings.py
will not need to be rebuilt but in some cases you might be prompted to do so. The file is generated by ./config/update-config.py
.
It is important that you are in the config
/ directory before executing update-config.py
. If you are not, /etc/veil/settings.py
will be incorrect and when you launch Veil you will see the following.
Main Menu
0 payloads loaded
Don't panic. Run: ./Veil.py --config
.
This project is licensed under the GNU General Public License v3 license.