nccgroup / metasploitavevasion

Metasploit AV Evasion Tool

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Metasploit AV Evasion

Metasploit payload generator that avoids most Anti-Virus products.

Released as open source by NCC Group Plc - http://www.nccgroup.com/

Developed by Daniel Compton, daniel dot compton at nccgroup dot com

https://github.com/nccgroup/metasploitavevasion

Released under AGPL see LICENSE for more information

=================================== Updated 08/2015 by Jason Soto, jason_soto [AT] jsitech [DOT] com

Removed Deprecated Commands in favor of MsfVenom

Updated 12/2015

Removed use of ifconfig for more Distro Compatibility, Using "ip route" for ip Detection

Added gcc compiler use condition for use in Arch Based Distros

Using "msfconsole -x" for auto Listener launching instead of resource file

Code Cleanup

www.jsitech.com

https://github.com/jsitech

Twitter = @JsiTech

Tested on Kali Linux

Installing

git clone https://github.com/nccgroup/metasploitavevasion.git

chmod +x the avoid.sh file before use.

How To Use

./avoid.sh

Then follow the on screen prompts.

Features

  • Easily generate a Metasploit executable payload to bypass Anti-Virus detection
  • Local or remote listener generation
  • Disguises the executable file with a PDF icon
  • Executable opens minimised on the victims computer
  • Automatically creates AutoRun files for CDROM exploitation

Screen Shot

Screenshot

Change Log =======================

Version 1.5 - Official release.

About

Metasploit AV Evasion Tool

License:GNU Affero General Public License v3.0


Languages

Language:Shell 100.0%