@XylentAntivirus was discrediting OmniDefender's detection engine so I decided to take a look at his test video to see where we could improve.
Turns out he's running linux malware (ELF, Bash, sh) and .unknown files and APK malware on windows that he downloaded from MalwareBazaar to test OmniDefender. I don't know why he's trying to run linux's executable linkable format on windows nor why he's including them in his tests. He seems to be running them all manually without providing any information on how many were blocked so it's quite hard to tell which ran successfully. I suppose they were just waiting to see if any false positive slipped by and ignoring the detection rate.
I took a further look at the missed samples, out of all the windows malware he tried to run from MalwareBazaar's 2025-07-23.zip sample, which contains exactly:
.exe: 155
.zip: 14
.js: 24
.sh: 15
.elf: 78
.msi: 5
.lnk: 5
.ps1: 4
.apk: 1
.xlsm: 1
.jar: 2
.vbe: 5
.rar: 4
.vbs: 4
.zipx: 1
.dll: 1
.ace: 1
.pyc: 1
.unknown: 3
.bat: 2
.gz: 1
.url: 1
Starting from 1:08 in the video, Eraser.exe in his malware test ran successfully, which has a hash of 113639d811695718906264e37ef179c1 and is benign in virustotal. They didn't bother to check if it was malware.
22:27, Missed Sample, Fixed.
22:48, Missed Sample, Fixed.
37:17, Missed Sample, Fixed.
40:17, Missed Sample, Fixed
The other missed samples all the way to 55:58 in the video were .ps1 or .pyc which is not currently pro-actively detected so they'll be missed.
False positives included x86 versions of microsoft at 5:46 and around 52:00 and which have been fixed.
I don't know of @XylentAntivirus's qualifications, their misunderstanding on linux and windows and suspended and blocked processes which they assumed were running without simply looking at the CPU Tab showing the suspended and blocked malware led them to believe everything was running despite over 96% of them being blocked, discounting linux files which can't natively run on Windows without something like WSL.
Ok then I will tesst with my new malware finder script which generally finds executables related to windows and never uploaded to virustotal. I was testing with malwarebazaar because he should detect known examples at least.

