This month we’re really happy to be introducing a new language into the Veil-Framework for bypassing antivirus. So far, we have Python, C, C#, Powershell, and Ruby. As you probably can guess, we are happy to be adding in support for Go!
To use Go payloads, the first thing you will need to do is re-run the setup script that comes bundled with Veil-Evasion. This will auto download Go and compile from source in a method that allows go to cross-compile and create Windows executables within Linux.
Once installed, you will see there are currently four different Go payloads available in the framework. One of the payloads is the traditional shellcode injection payload, and the others are pure Go meterpreter stagers. The Go payloads were submitted to us by @b00stfr3ak44, we definitely appreciate them being sent our way for the community to use!
We’d love to continue to encourage people to create new payloads, in any language that you think would be fun. If you’d be willing to send a payload you’ve created to us to include within Veil-Evasion, we’d be happy to do anything we can to help you along the way.