Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
  • Past Issues

AV evasion techniques: A practical evaluation of payload obfuscation using MSFvenom, Veil, Empire and FATRAT

Breadcrumb

  • Home
  • AV evasion techniques: A practical evaluation of payload obfuscation using MSFvenom, Veil, Empire and FATRAT

Kiran T V *, Harish gouda Mali Patil, Prasanna kumar K M and S.Nagamani

Department of MCA, SJB Institute of Technology, Bangalore -60. 

Research Article

International Journal of Science and Research Archive, 2025, 16(01), 1504-1511

Article DOI: 10.30574/ijsra.2025.16.1.2151

DOI url: https://doi.org/10.30574/ijsra.2025.16.1.2151

Received on 10 June 2025; revised on 18 July 2025; accepted on 22 July 2025

Antivirus (AV) programs play an essential role in defending today’s digital systems, acting as a first line of protection against malware by detecting, blocking, and neutralizing threats. Yet, as cyber defenses have evolved, so too have the tactics used by adversaries. Skilled attackers and ethical hacking teams are increasingly turning to evasion strategies designed to slip past antivirus mechanisms. Tools such as msfvenom and the Veil Framework are commonly used to craft payloads that are disguised well enough to evade both static and behavioral detection methods.

This study explores the practical effectiveness of these AV evasion techniques within a controlled lab environment, using Windows Defender as the focus of the analysis. The core aim is to observe and evaluate how conventional, signature-based AV engines respond when exposed to both unmodified and obfuscated payloads—especially those crafted using msfvenom and later enhanced with Veil.

All testing is conducted within a sandboxed setup to ensure safety and ethical boundaries are respected. The research outlines the methodology in detail, including the generation of reverse shell payloads, multi-layered obfuscation, and analysis of antivirus reactions to different variants. By capturing and analyzing this behavior, the study aims to provide deeper insight into the current limitations of endpoint security solutions and highlight techniques attackers use to bypass them. The results are expected to offer practical value for cybersecurity professionals, red teamers, and students focused on malware analysis and adversarial simulation.

Antivirus evasion; Obfuscated payloads; Metasploit; Veil; Endpoint security; Ethical hacking; Malware analysis

https://journalijsra.com/sites/default/files/fulltext_pdf/IJSRA-2025-2151.pdf

Preview Article PDF

Kiran T V, Harish gouda Mali Patil, Prasanna kumar K M and S.Nagamani. AV evasion techniques: A practical evaluation of payload obfuscation using MSFvenom, Veil, Empire and FATRAT. International Journal of Science and Research Archive, 2025, 16(01), 1504-1511. Article DOI: https://doi.org/10.30574/ijsra.2025.16.1.2151.

Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0

Footer menu

  • Contact

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution