Veil Evasion is no longer supported, use Veil 3.0!
This update contains a significant number of updates to the setup process.
This release adds in detection for "=" when providing extra options for msfvenom. Previously, if it wasn't included it would cause a crash.
This release includes a fix to prevent an error from allowing python payloads to run while using --noconsole
This fixes the runw.exe error
A static hash that's been added in by pyobfuscator has now been removed
This release includes an update for better Kali compatibility, patch provided by @sbrun
The RPC server Command injection vulnerability should now be fixed. It is now parsing user-supplied input correctly.
This version no longer binds the RPC server to 127.0.0.1 limiting the exposure of a vulnerability in the RPC server.
This release includes additional obfuscation to python payloads, and updates pyinstaller to version 3.1. 3.1 of Pyinstaller encrypts the bytecode, which we are utilizing. The key is randomly generated each time a payload is made.
Perl payloads are now included. Review the blog post for compiling them - https://www.veil-framework.com/perl-of-no-hope-january-v-day-2016/