If you are going to turn your code in to bullshit then the answer is buying a 
code signing certificate.

These kinds of destructive operations are the same thing done by exploit kits 
such as Veil <https://github.com/Veil-Framework/Veil> to bypass heuristical 
scans.

Reply via email to