Skip to content
Metasploit AV Evasion Tool
Shell
Find file
Latest commit b7fabee Dec 22, 2015 @olliencc olliencc Merge pull request #10 from Jsitech/master
Script Update
Failed to load latest commit information.
icons Version 1.4 May 9, 2013
.gitignore create gitignore to avoid tracking generated files Aug 10, 2013
LICENSE Version 1.4 May 9, 2013
README.md Minor Changes Dec 21, 2015
avoid.sh Minor Changes Dec 21, 2015

README.md

Metasploit AV Evasion

Metasploit payload generator that avoids most Anti-Virus products.

Released as open source by NCC Group Plc - http://www.nccgroup.com/

Developed by Daniel Compton, daniel dot compton at nccgroup dot com

https://github.com/nccgroup/metasploitavevasion

Released under AGPL see LICENSE for more information

Updated 08/2015 by Jason Soto, jason_soto [AT] jsitech [DOT] com

Removed Deprecated Commands in favor of MsfVenom

Updated 12/2015

Removed use of ifconfig for more Distro Compatibility, Using "ip route" for ip Detection

Added gcc compiler use condition for use in Arch Based Distros

Using "msfconsole -x" for auto Listener launching instead of resource file

Code Cleanup

www.jsitech.com

https://github.com/jsitech

Twitter = @JsiTech

Tested on Kali Linux

Installing

git clone https://github.com/nccgroup/metasploitavevasion.git

chmod +x the avoid.sh file before use.

How To Use

./avoid.sh

Then follow the on screen prompts.

Features

  • Easily generate a Metasploit executable payload to bypass Anti-Virus detection
  • Local or remote listener generation
  • Disguises the executable file with a PDF icon
  • Executable opens minimised on the victims computer
  • Automatically creates AutoRun files for CDROM exploitation

Screen Shot

Screenshot

Change Log

Version 1.5 - Official release.

Something went wrong with that request. Please try again.