Antivirus Software Companies have seen a lot of development over the last decennary, beginning with the signature-based scanners and then slowly implementing more advanced heuristics techniques. Most of these have shown their ability to scan files stored on the hard drive and also opcodes in memory. As of date, most antivirus detection technologies used are; signature-based detection and heuristic-based detection. Malware signatures work by creating checksum hashes of known suspect files, so the smallest change prevents a match. Sometimes hackers and malicious users try finding ways around signatures and bypass signature-based detections by modifying existing malware with a few harmless strings to throw off signature based detection. I propose a project which aims to study how attackers and malicious codes can identify signatures of malware and modify it without changing its functionality with the aim of avoiding signature-based Antivirus software scanners which do not use heuristics at all. I have used netcat binary files in the reverse engineering process and proved how many antivirus scanner scan be bypassed. I also have used the python tool to create codes. From my experiment, I have proved the futility of the antivirus protection against malware. Through this report, I want to reach out and point out the safety measurements users can take to reduce attacks. I also have ensured that the common users are informed about the antivirus types and how they work. A user must be aware that antivirus software is not a full-proof protection as there are plenty of loopholes the researchers have to point out, but it does not mean the security should be compromised. Through this report, I would also like to highlight the fact that it is the responsibility of the user to follow simple guidelines to ensure protection, and the antivirus developers are responsible for keeping their database up-to-date.