This document discusses techniques for bypassing antivirus software using PowerShell. It describes Empire, a post-exploitation framework that allows attackers to execute scripts on victim machines using PowerShell or Python. These scripts regularly connect to a C2 server using HTTP/HTTPS. It then focuses on how Empire's PowerShell scripts can bypass detection through obfuscation techniques like using alternative casing, escape characters, and encoding files in base64. Custom Invoke-Mimikatz scripts can execute any EXE file in memory, making detection difficult for antivirus software. Limiting PowerShell access and monitoring execution logs are recommended defenses.