
Since I wanted to maintain metasploit compatibility, I chose to use shellcode generated by the metasploit framework, specifically msfvenom. With these goals in mind, I continued researching methods of bypassing AV. Attempt to make each payload file as random as possible.
Utilize payloads that are compatible with the Metasploit framework, and expand upon these in future releases. Bypass common AV solutions that I/we routinely encounter in most network environments. About two months ago I started to take a more serious look in how I could take my recent research and turn it into something that more usable and useful. Researching methods to bypass antivirus solutions has been an interest of mine on and off for the past 6 months. The level of effort that goes into each “battle” relies on the AV solution, its definitions, etc. On nearly every assessment, pen testers have to fight a battle against antivirus solutions.
Any questions on using Veil? Join us in #veil on Freenode! NOTE: Please, be kind, and don’t submit any payloads to ANY online virus scanner! Please be sure to check out, Veil’s website for the latest tutorials, updates, and repo location.