Releases: Veil-Framework/Veil-Evasion
Major updates to setup process
This update contains a significant number of updates to the setup process.
"=" Detection
This release adds in detection for "=" when providing extra options for msfvenom. Previously, if it wasn't included it would cause a crash.
Fix for Python Payloads
This release includes a fix to prevent an error from allowing python payloads to run while using --noconsole
2.26.5 Release
This fixes the runw.exe error
Removes PyObfuscator Hash
A static hash that's been added in by pyobfuscator has now been removed
Update for Kali compatibility
This release includes an update for better Kali compatibility, patch provided by @sbrun
Fix Command Injection Issue within RPC Server
The RPC server Command injection vulnerability should now be fixed. It is now parsing user-supplied input correctly.
2.25 RPC Server Bind Change
This version no longer binds the RPC server to 127.0.0.1 limiting the exposure of a vulnerability in the RPC server.
2.24 Release
This release includes additional obfuscation to python payloads, and updates pyinstaller to version 3.1. 3.1 of Pyinstaller encrypts the bytecode, which we are utilizing. The key is randomly generated each time a payload is made.
2.23 Release
Perl payloads are now included. Review the blog post for compiling them - https://www.veil-framework.com/perl-of-no-hope-january-v-day-2016/