Evading Antivirus Software Detection Using Python and PowerShell Obfuscation Framework
 A. Schaffhauser, W. Mazurczyk, L. Caviglione, M. Zuppelli, and J. Hernandez-Castro, “Efficient Detection and Recovery ofMalicious PowerShell Scripts Embedded into Digital Images,”Security and Communication Networks, vol. 2022, 2022. F. Antony and R. Gustriansyah, “Deteksi Serangan Denial of Service pada Internet of Things Menggunakan Finite-State Au-tomata,”MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 21, no. 1, pp. 43–52, 2021. F. A. Garba, K. I. Kunya, S. A. Ibrahim, A. B. Isa, K. M. Muhammad, and N. N. Wali, “Evaluating the State of the Art AntivirusEvasion Tools on Windows and Android Platform,”2019 2nd International Conference of the IEEE Nigeria Computer Chapter(NigeriaComputConf), pp. 1–4, 2019. A. K. Kayani and M. Q. Saeed, “Comparative analysis of anti-virus evasion malware creator tools of kali linux, with proposedmodel for obfuscation,”2021 International Conference on Cyber Warfare and Security (ICCWS), pp. 24–29, 2021. S. Talukder and Z. Talukder, “A Survey on Malware Detection and Analysis Tools,”International Journal of Network Security& Its Applications, vol. 12, no. 2, pp. 37–57, 2020. Y. Fang, M. Xie, and C. Huang, “PBDT: Python Backdoor Detection Model Based on Combined Features,”Security andCommunication Networks, vol. 2021, 2021. H. Patel, D. Patel, J. Ahluwalia, V. Kapoor, K. Narasimhan, H. Singh, H. Kaur, G. H. Reddy, S. S. Peruboina, and S. Butakov,“Evaluation of Survivability of the Automatically Obfuscated Android Malware,”Applied Sciences (Switzerland), vol. 12,no. 10, 2022. S. Mirza, H. Abbas, W. B. Shahid, N. Shafqat, M. Fugini, Z. Iqbal, and Z. Muhammad, “A Malware Evasion Technique for Au-diting Android Anti-Malware Solutions,”2021 IEEE 30th International Conference on Enabling Technologies: Infrastructurefor Collaborative Enterprises (WETICE), pp. 125–130, 2021. S. A. Aminu, Z. Sufyanu, T. Sani, and A. Idris, “Evaluating the effectiveness of antivirus evasion tools against windows plat-form,”Fudma Journal of Sciences, vol. 4, no. 1, pp. 112–119, 2020. A. Johnson and R. J. Haddad, “Evading Signature-Based Antivirus Software Using Custom Reverse Shell Exploit,”Southeast-Con 2021, pp. 1–6, 2021. F. A. Garba, F. U. Yarima, K. I. Kunya, F. U. Abdullahi, A. A. Bello, A. Abba, and A. L. Musa, “Evaluating Antivirus Eva-sion Tools Against Bitdefender Antivirus,” inProceedings of the International Conference on FINTECH Opportunities andChallenges, Karachi, Pakistan, vol. 18, 2021. M. Tabassum, S. Mohanan, and T. Sharma, “Ethical Hacking and Penetrate Testing using Kali and Metasploit Framework,”International Journal of Innovation in Computational Science and Engineering, vol. 2, no. 1, pp. 09–22, 2021. A. S. Adam and Z. Sufyanu, “Performance Comparison of PyRAT and Phantom Antivirus Software Evasion Tools,”SLUJournal of Science and Technology, vol. 2, no. 1, pp. 65–72, 2021. S. Raj and N. K. Walia, “A Study on Metasploit Framework: A Pen-Testing Tool,”2020 International Conference on Compu-tational Performance Evaluation, ComPE 2020, pp. 296–302, 2020. C. Leka, C. Ntantogian, S. Karagiannis, E. Magkos, and V. S. Verykios, “A Comparative Analysis of VirusTotal and DesktopAntivirus Detection Capabilities,”2022 13th International Conference on Information, Intelligence, Systems & Applications(IISA), pp. 1–6, 2022. V. Ravi, S. Gururaj, H. Vedamurthy, and M. Nirmala, “Analysing corpus of office documents for macro-based attacks usingMachine Learning,”Global Transitions Proceedings, vol. 3, no. 1, pp. 20–24, 2022.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.