As a penetration tester, always remember that you are simulating real-world attacks, and in the real world, hackers are trying to bypass antivirus protection using many techniques. The Veil-Framework is a fantastic tool for avoiding payload detection. To install Veil 3.0, you need to download it from its official GitHub source at https://github.com/Veil-Framework/Veil:
# git clone https://github.com/Veil-Framework/Veil
![](https://static.packt-cdn.com/products/9781788624480/graphics/assets/de552394-6fff-48de-aa1e-9820e44ebf15.png)
Now you just need to select a task from an assisted main menu:
![](https://static.packt-cdn.com/products/9781788624480/graphics/assets/484d7aa0-1012-4378-8fe7-486fd3642f15.png)
To generate a payload, select list, and type use 1:
![](https://static.packt-cdn.com/products/9781788624480/graphics/assets/a3479c5e-9124-48b0-9fab-06bb8c974569.png)
To list all the available payloads, use list as usual:
![](https://static.packt-cdn.com/products/9781788624480/graphics/assets/35842997-0935-4029-8aa9-a3958fb14f4c.png)
Select your payload using the use command:
![](https://static.packt-cdn.com/products/9781788624480/graphics/assets/091f19c4-0d89-4480-ace5-88c7e2d84839.png)
Enter generate to create the payload:
![](https://static.packt-cdn.com/products/9781788624480/graphics/assets/6af1b920-0d49-4632-984a-1edce5bfa903.png)
Complete the options, and you will generate an undetectable payload, as simple as that:
![](https://static.packt-cdn.com/products/9781788624480/graphics/assets/44ea3bd3-77f1-49a8-b179-1f8aa937e171.png)
You can also do an Nmap scan using Metasploit, exporting the results and importing...