The Veil pen-testing platform provides some powerful tools that will
hide your attack from antivirus scanners – and Veil even supports
Metasploit payloads.
Veil is a penetration-testing framework that was originally designed to
evade antivirus protection on the target system. Since its first release
three years ago, Veil has expanded to include other payload delivery
options, and it even comes with some post-exploitation capabilities. The
original Veil release only supported three payload shellcode injection
options. New versions can incorporate the complete Metasploit Windows
payload system.
Veil
is capable of bypassing antivirus solutions deployed on endpoints
during a pen-testing session. To bypass antivirus protection, Veil
generates random and unique payloads for exploits. This ability to make
random changes to the payload is similar to polymorphic malware that
changes as it moves from host to host, making it much more difficult to
discover than traditional malware, which has a distinct signature.
Veil's exploits are compatible with popular penetration testing tool
frameworks like Metasploit, which makes it very easy to incorporate
Metasploit into your existing penetration testing routine. Veil
aggregates various shellcode injection techniques across multiple
languages, putting the focus on automation and usability.
Veil-Evasion Features
The
original purpose of Veil was to evade antivirus protection by morphing
the attack in random ways that would not turn up on an anitvirus
signature. As the project began to evolve and take on additional
capabilities, the original antivirus-evading component was renamed
Veil-Evasion.
Veil-Evasion can use custom or Metasploit-generated
shellcode, and you can easily integrate third-party tools, such as
Hyperion, PEScrambler, and BackDoor Factory.

Issue #32 will be shipped to subscribers and available on newsstands starting approximately:
UK/Europe: April 16
North America: May 13
Australia: June 13