This document discusses techniques for bypassing antivirus software using PowerShell. It describes Empire, a post-exploitation framework that allows attackers to execute scripts on victim machines using PowerShell or Python. These scripts regularly connect to a C2 server using HTTP/HTTPS. It then focuses on how Empire's PowerShell scripts can bypass detection through obfuscation techniques like us

