|Compile After Delivery
|Indicator Removal from Tools
|Dynamic API Resolution
|LNK Icon Smuggling
|Application Isolation and Sandboxing
Browser sandboxes can be used to mitigate some of the impact of exploitation, but sandbox escapes may still exist.