Watch this video on YouTube
Danny, a black hat hacker, is using metasploit to get unauthorized entry into a network. Which metasploit framework should he use to bypass the antivirus?