Skip to content
Metasploit AV Evasion Tool
Find file
Latest commit b7fabee Dec 22, 2015 @olliencc olliencc Merge pull request #10 from Jsitech/master
Script Update
Failed to load latest commit information.
icons Version 1.4 May 9, 2013
.gitignore create gitignore to avoid tracking generated files Aug 10, 2013
LICENSE Version 1.4 May 9, 2013 Minor Changes Dec 21, 2015 Minor Changes Dec 21, 2015

Metasploit AV Evasion

Metasploit payload generator that avoids most Anti-Virus products.

Released as open source by NCC Group Plc -

Developed by Daniel Compton, daniel dot compton at nccgroup dot com

Released under AGPL see LICENSE for more information

Updated 08/2015 by Jason Soto, jason_soto [AT] jsitech [DOT] com

Removed Deprecated Commands in favor of MsfVenom

Updated 12/2015

Removed use of ifconfig for more Distro Compatibility, Using "ip route" for ip Detection

Added gcc compiler use condition for use in Arch Based Distros

Using "msfconsole -x" for auto Listener launching instead of resource file

Code Cleanup

Twitter = @JsiTech

Tested on Kali Linux


git clone

chmod +x the file before use.

How To Use


Then follow the on screen prompts.


  • Easily generate a Metasploit executable payload to bypass Anti-Virus detection
  • Local or remote listener generation
  • Disguises the executable file with a PDF icon
  • Executable opens minimised on the victims computer
  • Automatically creates AutoRun files for CDROM exploitation

Screen Shot


Change Log

Version 1.5 - Official release.

Something went wrong with that request. Please try again.