Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.
Veil is current under support by @ChrisTruncer
- Debian or Kali - run the setup script - sudo ./setup.sh -c
NOTE: Installation must be done with superuser privileges. If you are not using Kali Linux, prepend each command with
sudo
or change to the root user before beginning.
Run ./setup.sh -c
on Linux.
Install by cloning from git, not via apt!
NOTE: Using Py2Exe is recommended over Pyinstaller for lower detection rate.
Install Python 3.3, Py2Exe, PyCrypto, and PyWin32 on a Windows computer.
apt-get -y install git
git clone https://github.com/Veil-Framework/Veil.git
cd Veil/
cd setup
sudo ./setup.sh -c
NOTE: This must be done with superuser privileges. If you are not using Kali Linux, prepend each command with
sudo
or change to the root user before beginning.
Most of the time the config file at /etc/veil/settings.py
will not need to be rebuilt but in some cases you might be prompted to do so. The file is generated by config/update.py
.
It is important that you are in the config/ directory before executing update.py. If you are not, settings.py will be incorrect and when you launch Veil you will see the following.
Main Menu
0 payloads loaded
Don't panic. Enter the config/ dir and re-run update.py.