0xnhl

Veil

/ Update
1 min read

Veil is a framework that can be used with Metasploit to evade antivirus checks and other security controls.
You can download Veil from https://github.com/Veil-Framework/Veil and obtain detailed documentation from https://github.com/Veil-Framework/Veil/wiki.

Usage#

Step 1. Launch Veil#

After using the veil command to launch Veil, the Veil menu is displayed
attachments/b12baa058a835fcc05da4fa3468f176f7ed2ee17

Step 2. Select Evasion#

To use Veil for evasion, select the first option (number 1). Veil then shows the available payloads and Veil commands.
attachments/b32e73c419d9ae5ea743ab96185107203b4481d2

Step 3. List the Payloads#

To list the available payloads, use the list command, and you see the screen in Figure.
attachments/f47da85c79e930eed5192999063e7649b8af94b1

Step 4. Install a Payload#

In Figure, the Meterpreter reverse TCP payload is used. After you select the payload, you have to set the local host (LHOST) and then use the generate command to generate the payload.
Figure shows the default Python installer being used to generate the payload. 
**Figure ** - Configuring the LHOST and Generating the Payload_
attachments/fc735a95e9c0aa1391b88e4c1b86f78966258760

Step 5. Verify Payload File Location#

Once the payload is generated, the screen shown in Figure is displayed. The top portion of Figure lists the locations of the payload executable, the source code, and the Metasploit resource file.
attachments/516a9b8211cb2b922cc14fc64faff449b608305f

Veil
https://nahil.xyz/vault/tools/veil/
Author Nahil Rasheed
Published at July 7, 2025
Disclaimer This content is provided strictly for educational purposes only.