Skip to content


Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions
Python C Objective-C Shell
branch: master


Veil-Evasion is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.

NOTE: ./setup/ should be re-run on every major version update. If you receive any major errors on running Veil-Evasion, first try re-running this script to install any additional packages and update the common configuration file.

Veil-Evasion is currently under active support by @ChrisTruncer, @TheMightyShiv, @HarmJ0y

Thanks to: @jasonjfrank @mjmaley @davidpmcguire

Software Requirements:


  1. Use Kali (x86) and all dependencies are pre-installed

  • or -

  1. Install Python 2.7
  2. Install PyCrypto >= 2.3

Windows (for Py2Exe compilation)

  1. Python (tested with x86 -
  2. Py2Exe (
  3. PyCrypto (
  4. PyWin32 (

Setup (tldr;)

Run ./ on Kali x86 (for Pyinstaller). Install Python 2.7, Py2Exe, PyCrypto, and PyWin32 on a Windows computer (for Py2Exe).


Veil-Evasion was designed to run on Kali Linux, but should function on any system capable of executing python scripts. Simply call Veil-Evasion from the command line, and follow the menu to generate a payload. Upon creating the payload, Veil-Evasion will ask if you would like the payload file to be converted into an executable by Pyinstaller or Py2Exe.

If using Pyinstaller, Veil-Evasion will convert your payload into an executable within Kali.

If using Py2Exe, Veil-Evasion will create three files:

  • - The payload file
  • - Required file for Py2Exe
  • runme.bat - Batch script for compiling the payload into a Windows executable

Move all three files onto your Windows machine with Python installed. All three files should be placed in the root of the directory Python was installed to (likely C:\Python27). Run the batch script to convert the Python script into an executable format.

Place the executable file on your target machine through any means necessary and don't get caught!

Something went wrong with that request. Please try again.