Nolan-Burkhart / defender-disablerLinks
a simple C++ tool using the windows registry to disable windows defender
☆15Updated 3 years ago
Alternatives and similar repositories for defender-disabler
Users that are interested in defender-disabler are comparing it to the libraries listed below
Sorting:
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- simple user-mode Rootkit☆105Updated 2 years ago
- ☆8Updated 2 years ago
- minimal msvc-windows exclusive lazy importer for C++☆34Updated 3 years ago
- Library containing Anti-RE and Anti-Debug methods.☆108Updated last month
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆55Updated last year
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆159Updated last year
- Advanced Remote Access Trojan & Server☆36Updated 4 years ago
- Various Process Injection Techniques☆148Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆154Updated 2 years ago
- proof of concept of user-mode anti-breakpoint technique☆15Updated last year
- A simple Windows kernel rootkit.☆92Updated 3 weeks ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆81Updated 6 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- This is a RAT/Backdoor written in C++☆45Updated 4 years ago
- ☆45Updated 4 months ago
- codecave hook reverse engineering toolkit.☆36Updated last year
- Simple PE Packer Which Encrypts .text Section☆51Updated 8 years ago
- A very weird RAT☆19Updated 2 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆9Updated 3 years ago
- Obfuscate calls to imports by patching in stubs☆68Updated 3 years ago
- ☆78Updated 3 years ago
- Скрытие процессов и файлов в user mode☆21Updated 5 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆78Updated last year
- Example Windows Kernel-mode Driver which enumerates running processes.☆56Updated 2 years ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- A kernel-mode rootkit with remote control☆213Updated 4 years ago
- Hide malware behind a legit process C#☆120Updated 5 years ago
- Exploit MsIo vulnerable driver☆104Updated 3 years ago