Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • IJSRA CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN Approved Journal || eISSN: 2582-8185 || CODEN: IJSRO2 || Impact Factor 8.2 || Google Scholar and CrossRef Indexed

Peer Reviewed and Referred Journal || Free Certificate of Publication

Research and review articles are invited for publication in March 2026 (Volume 18, Issue 3) Submit manuscript

AV evasion techniques: A practical evaluation of payload obfuscation using MSFvenom, Veil, Empire and FATRAT

Breadcrumb

  • Home
  • AV evasion techniques: A practical evaluation of payload obfuscation using MSFvenom, Veil, Empire and FATRAT

Kiran T V *, Harish gouda Mali Patil, Prasanna kumar K M and S.Nagamani

Department of MCA, SJB Institute of Technology, Bangalore -60. 

Research Article

International Journal of Science and Research Archive, 2025, 16(01), 1504-1511

Article DOI: 10.30574/ijsra.2025.16.1.2151

DOI url: https://doi.org/10.30574/ijsra.2025.16.1.2151

Received on 10 June 2025; revised on 18 July 2025; accepted on 22 July 2025

Antivirus (AV) programs play an essential role in defending today’s digital systems, acting as a first line of protection against malware by detecting, blocking, and neutralizing threats. Yet, as cyber defenses have evolved, so too have the tactics used by adversaries. Skilled attackers and ethical hacking teams are increasingly turning to evasion strategies designed to slip past antivirus mechanisms. Tools such as msfvenom and the Veil Framework are commonly used to craft payloads that are disguised well enough to evade both static and behavioral detection methods.

This study explores the practical effectiveness of these AV evasion techniques within a controlled lab environment, using Windows Defender as the focus of the analysis. The core aim is to observe and evaluate how conventional, signature-based AV engines respond when exposed to both unmodified and obfuscated payloads—especially those crafted using msfvenom and later enhanced with Veil.

All testing is conducted within a sandboxed setup to ensure safety and ethical boundaries are respected. The research outlines the methodology in detail, including the generation of reverse shell payloads, multi-layered obfuscation, and analysis of antivirus reactions to different variants. By capturing and analyzing this behavior, the study aims to provide deeper insight into the current limitations of endpoint security solutions and highlight techniques attackers use to bypass them. The results are expected to offer practical value for cybersecurity professionals, red teamers, and students focused on malware analysis and adversarial simulation.

Antivirus evasion; Obfuscated payloads; Metasploit; Veil; Endpoint security; Ethical hacking; Malware analysis

https://ijsra.net/sites/default/files/fulltext_pdf/IJSRA-2025-2151.pdf

Preview Article PDF

Kiran T V, Harish gouda Mali Patil, Prasanna kumar K M and S.Nagamani. AV evasion techniques: A practical evaluation of payload obfuscation using MSFvenom, Veil, Empire and FATRAT. International Journal of Science and Research Archive, 2025, 16(01), 1504-1511. Article DOI: https://doi.org/10.30574/ijsra.2025.16.1.2151.

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

          

   

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution