1 00:00:01,460 --> 00:00:03,350 Creating custom payloads. 2 00:00:06,460 --> 00:00:12,210 The payloads of well-known frameworks such as Métis Boite, easily recognized by the security systems, 3 00:00:12,940 --> 00:00:15,920 the best way to avoid this is to create your own payload. 4 00:00:16,420 --> 00:00:24,850 There are open source and free tools to create your own malware and payload such as Vayle avoid with 5 00:00:24,850 --> 00:00:26,250 a zero instead of A.. 6 00:00:27,210 --> 00:00:27,960 Syringe. 7 00:00:31,160 --> 00:00:32,210 And Empire. 8 00:00:34,010 --> 00:00:37,540 Now you will see how to create a custom payload using Vayle framework. 9 00:00:38,170 --> 00:00:44,480 First, let's install it to our Caly machine if we Google as veil of Asian. 10 00:00:48,920 --> 00:00:52,410 The first thing will be the GitHub page of Vayle Evasion. 11 00:00:53,090 --> 00:00:57,410 This page redirects us to the GitHub page of Vail 3.0. 12 00:00:58,700 --> 00:01:00,350 In the README part of the page. 13 00:01:04,300 --> 00:01:06,700 We see the quick installation guide. 14 00:01:08,300 --> 00:01:13,790 We simply followed the steps of this installation guide installed, yet if it's not already installed. 15 00:01:16,920 --> 00:01:19,950 Create the clone of the Vail 3.0 project. 16 00:01:30,090 --> 00:01:31,770 Go to Vayle folder. 17 00:01:36,240 --> 00:01:42,180 Under the set up folder, run set up S.H. script with the Dachsie parameter. 18 00:01:46,020 --> 00:01:47,550 And this will take a few minutes. 19 00:02:08,340 --> 00:02:11,590 In this period, some install wizards are opened. 20 00:02:11,820 --> 00:02:15,420 Don't worry, they're all next next finish wizards.