Welcome to 2015! For our January 2015 V-Day, we have a small addition to our Ruby shellcode injection payload. Currently, the payloads are injection shellcode into memory using the VirtualAlloc API call routine, but this was the only method. We’ve just added in the ability to inject shellcode into memory via HeapCreate and HeapAlloc.
Additionally, the Metasploit Project devs have updated Meterpreter to version 0.0.13. We’ve just added support for the latest version of Meterpreter in Veil-Evasion.
If anyone has any questions, feel free to reach out to us!