Metasploit AV Evasion Tool
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Failed to load latest commit information.
icons Version 1.4 May 9, 2013
.gitignore create gitignore to avoid tracking generated files Aug 10, 2013
LICENSE Version 1.4 May 9, 2013 Minor Changes Dec 21, 2015 Minor Changes Dec 21, 2015

Metasploit AV Evasion

Metasploit payload generator that avoids most Anti-Virus products.

Released as open source by NCC Group Plc -

Developed by Daniel Compton, daniel dot compton at nccgroup dot com

Released under AGPL see LICENSE for more information

=================================== Updated 08/2015 by Jason Soto, jason_soto [AT] jsitech [DOT] com

Removed Deprecated Commands in favor of MsfVenom

Updated 12/2015

Removed use of ifconfig for more Distro Compatibility, Using "ip route" for ip Detection

Added gcc compiler use condition for use in Arch Based Distros

Using "msfconsole -x" for auto Listener launching instead of resource file

Code Cleanup

Twitter = @JsiTech

Tested on Kali Linux


git clone

chmod +x the file before use.

How To Use


Then follow the on screen prompts.


  • Easily generate a Metasploit executable payload to bypass Anti-Virus detection
  • Local or remote listener generation
  • Disguises the executable file with a PDF icon
  • Executable opens minimised on the victims computer
  • Automatically creates AutoRun files for CDROM exploitation

Screen Shot


Change Log =======================

Version 1.5 - Official release.