Most kits, especially those that use time as a seed, can produce infinite amount of malware samples. As long as time exists, these kits will produce unique malware samples. Each sample creation is then subjected to different kinds of armoring tools. Each of these armoring tools add a level of difficulty when analyzing and reversing malware but most importantly it adds different protective mechanisms designed to evade security solutions such as anti-sandboxing techniques, encryption, benign program binding/joining, and many more to the DiY kit created sample. After going through different armoring tools, the samples are then QA’ed to ensure any security products do not detect it. This is the final step of the process. The result is an army of armored malware.