Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

Veil is an awesome tool developed by Chris Truncer @ChrisTruncer, Mike Wright @TheMightyShiv and The Grayhound @the_grayhound specifically designed for Kali Linux

Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you

I want to talk about Veil and give some examples about how to bypass several anti-virus.

The main changes in the latest versions are:

  • x64 compatibility – They have updated their setup script in order to make Veil compatible with both x86 and x64 versions.
  • Update Feature – Now Veil has an update function. Now we can update Veil either the command line or menu.

If you want to install Veil in your whatever environment you prefer, you can use the commands below:



cd Veil-master/setup

cd ..


If you want to work with Kali Linux, with the commands below it will be enough.

apt-get update

apt-get install veil 

I had a  bad experience with the second option and I prefer to install Veil with the first one using “” script.

The Veil’s developers don’t want to submit any payload to to avoid distribution to the anti-virus vendors. There is an alternative: That site scans the suspicious files for malware detection and offers us the option: “Do not distribute the sample”.

When Veil has been installed, just run it with the command below:


By default in Kali Linux, we can see 18 payloads ready to be used. Now we can type “use”.


Here, Veil offers us more information about the payloads. In this case I chose python/b64VirtualAlloc typing “18


When our payload is loaded, type “generate“. You can set some specifics options, but in this post, we are going to try the default options.


Now we are going to select msfvenom by typing “1


After that, we need to type some details:

  • Enter metasploit payload: “windows/meterpreter/reverse_tcp
  • Enter value for ‘LHOST’, [tab] for local IP: “”
  • Enter value for ‘LPORT’: “443

Then it’s necessary to wait while the shellcode is been generated.


You need to press enter and then Veil requests the name of our payload. In this case “undetectable” (or whatever you want)


We are going to use Pyinstaller. It will create a .exe installable. For this, we are going to type “1


In the end, we can get our executable at “/root/Veil-master/output/compiled/


Now, we have our executable and we are going to submit it to Please, remember to check “Do not distribute the sample“. If you choose to don’t check this options or you decide to submit the executable your file will be investigated and maybe it will be recognized by some anti-virus vendors.


You can see in the picture below any of the anti-virus vendors have detected our file as malicious. We have got a rate detection of 0%!!!!