Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Veil - Advanced Obfuscation of Payloads


sQuo

Recommended Posts

Veil - Advanced Obfuscation of Payloads

Autor: d4rkcat

 

 

Veil -

This is the hidden content, please


Veil is an open source payload obfusctator with support for obfuscating shellcode

and meterpreter payloads using a variety of different programming languages and methods.

 

If you have the Kali repo's on your distro, all it takes to get it installed is

 

 

This is the hidden content, please

 

 

The program allows you to enter the options into it using a msf-style prompt using commands like 'use' 'generate' ect.

 

This is the hidden content, please

 

This is the hidden content, please

 

This is the hidden content, please

 

And of course the quickest option, Veil also allows entry of parameters at the command line:

 

This is the hidden content, please

 

This is the hidden content, please

 

Veil has support for pyinstaller which is a linux program that can compile python into self-contained windows executable's. This relies on having Python 2.7 installed in Wine.

 

NOTE: you can install all the prerequisites to pyinstaller by executing the script /usr/share/veil/setup/setup.sh

 

You don't have to use py2exe or any windows machine if you use pyinstaller!

 

I decided to go the other possible route and installed py2exe (

This is the hidden content, please
) on my Windows7 VM.

 

Whenever I need to compile a payload I transfer the python source file over to windows and compile it using a python setup script:

 

This is the hidden content, please

 

The code can then be compiled from c:\Python27 at the windows cmd prompt with:

 

This is the hidden content, please

 

The compiled executable should now be in c:\Python27\dist

 

Autor: d4rkcat

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.