es3n1n / defendnotLinks
An even funnier way to disable windows defender. (through WSC api)
☆2,321Updated this week
Alternatives and similar repositories for defendnot
Users that are interested in defendnot are comparing it to the libraries listed below
Sorting:
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆2,023Updated last year
- Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in …☆803Updated last week
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆673Updated 8 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,279Updated 7 months ago
- Advanced VM detection library and tool☆718Updated last week
- An open-source windows defender manager. Now you can disable windows defender permanently.☆1,668Updated last year
- Stop Windows Defender programmatically☆978Updated 2 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,136Updated last year
- Because AV evasion should be easy.☆765Updated 7 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆806Updated last week
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,323Updated 9 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,123Updated last month
- Arcane - A secure remote desktop application for Windows with the particularity of having a server entirely written in PowerShell and…☆264Updated last week
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆673Updated 10 months ago
- Living Off The Land Drivers☆1,223Updated last week
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆769Updated 2 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆988Updated last month
- Phishing with a fake reCAPTCHA☆575Updated 10 months ago
- Tunnel TCP connections through a file☆945Updated 2 weeks ago
- Converts a EXE into DLL☆1,333Updated 2 months ago
- The essential toolkit for reversing, malware analysis, and cracking☆901Updated last month
- Windows Kernel Rootkit in Rust☆626Updated last week
- The third-party lightweight XAML-based out-of-box-experience oriented Hyper-V virtualization software based on Host Compute System API, R…☆827Updated last week
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,023Updated last week
- Automated decoding of encrypted text without knowing the key or ciphers used☆747Updated this week
- EDR Lab for Experimentation Purposes☆1,291Updated this week
- A tool that shows detailed information about named pipes in Windows☆683Updated 8 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆515Updated 11 months ago
- Application runtime environment customization utility☆524Updated 3 months ago
- kill anti-malware protected processes ( BYOVD) ( Microsoft Won)☆952Updated last year