Exploits for browser vulnerabilities are here to stay.
Most security products today are using reactive methods (signatures) to detect the specific exploit, instead of trying to detect the general case of the vulnerability exploitation. Evading those signatures is very easy, as I already showed.
The methods I presented were simple and very specific to the VML vulnerability. H.D. Moore have implemented some of these methods in his Metasploit's VML exploit module. Others were implemented in old browser exploit modules, like the createTextRange exploit module.
H.D. Moore, LMH, and I have decided to generalize the evasion methods and package them all into one project.
Introducing: VoMM (eVade-o-Matic Module for metasploit) - Taking browser exploits to the next level.
The purpose of this project is to create a module for Metasploit that will take any given browser exploit and make it as undetectable as possible.
Currently, most Anti-Viruses signatures relies on "variants". Meaning, any little change in the malicious code is considered by the AV as a new variant.
The VoMM project shows that this procedure cannot be applied to browser exploits, as each exploit can have endless number of "variants" with no change to the server side code.
More detailed information about the VoMM project, and the evasion techniques that were implemented, can be found in LMH's info-pull blog.