Veil Framework – Antivirus Evasion Framework

Outsmart Malicious Hackers


The Veil-Framework is a collection of red team security tools that implement various attack methods focused on antivirus evasion and evading detection.

Antivirus ‘solutions’ don’t often catch the bad guys, but they do often catch pen-testing during assignment. This tool came about as a way to execute existing shellcode in a way that could evade AV engines without rolling a new backdoor each time.

Veil Antivirus Evasion Framework

It currently consists of:

  • Veil-Evasion: a tool to generate antivirus-evading payloads using a variety of techniques and languages
  • Veil-Ordnance: a tool that can be used to quickly generate valid stager shellcode
  • Veil-Catapult: a psexec-style payload delivery system that integrates Veil-Evasion
  • Veil-Pillage: a modular post-exploitation framework that integrates Veil-Evasion
  • Veil-PowerView: a powershell tool to gain network situational awareness on Windows domains

The Approach

Veil Evasion does its’ work by:

  • Using an aggregation of various shellcode injection techniques across multiple languages
  • Having a focus on automation, usability, and developing a true framework
  • Using some shellcodeless Meterpreter stagers and “auxiliary” modules as well

One new payload is released each month with 30+ published payload modules.

You can download Veil Framework here (this is the ‘super’ project that will pull down the latest version of each tool):

Veil-Framework-Install.sh

Or read more here.


Posted in: Hacking Tools, Malware

, , , , , , , , , ,

Recent in Hacking Tools:
- HexorBase – Administer & Audit Multiple Database Servers
- PyExfil – Python Data Exfiltration Tools
- Netdiscover – Network Address Discovery Tool

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 2,001,214 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,513,017 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 692,350 views


Comments are closed.