Veil 3.1.11 released: antivirus evasion and evading detection
The Veil-Framework is a collection of red team security tools that implement various attack methods focused on antivirus evasion and evading detection.
Antivirus ‘solutions’ don’t often catch the bad guys, but they do often catch pen-testing during an assignment. This tool came about as a way to execute existing shellcode in a way that could evade AV engines without rolling a new backdoor each time.
At International Security Conference 2017, the leader of Veil project – Christopher Truncer was released Veil 3.0
What’s new:
You can get AntiVirus Evasion Reconstructed – Veil 3.0 paper here
Changelog
[2018-05-17]
Released.: 3.1.11
Modified.: Golang/meterpreter/* payloads have big fixed when injection via heap. Thanks to Carlos for pointing this out
[2018-05-16]
Released.: 3.1.10
Modified.: Setup script now in compatible with void thanks to PR #212
Installing
Usage
Copyright (C) 2017 ChrisTruncer
Source: https://github.com/Veil-Framework/