es3n1n / defendnot
An even funnier way to disable windows defender. (through WSC api)
☆507Updated last week
Alternatives and similar repositories for defendnot
Users that are interested in defendnot are comparing it to the libraries listed below
Sorting:
- WMI virus, because funny☆282Updated 3 months ago
- Decrypt App-Bound encrypted keys in Chrome 127+, using the IElevator COM interface bypassing path validation and encryption protections.☆518Updated this week
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆665Updated 6 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,185Updated 5 months ago
- WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API☆566Updated 3 months ago
- Because AV evasion should be easy.☆718Updated 5 months ago
- Phishing with a fake reCAPTCHA☆548Updated 8 months ago
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆1,953Updated 11 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,095Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆749Updated last month
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 4 months ago
- Windows Kernel Rootkit in Rust☆597Updated this week
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆332Updated last week
- Complete list of LPE exploits for Windows (starting from 2023)☆785Updated 2 weeks ago
- Nuke It From Orbit - remove AV/EDR with physical access☆258Updated 5 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆535Updated last week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,176Updated last year
- A tool that shows detailed information about named pipes in Windows☆639Updated 5 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆767Updated this week
- Living Off The Land Drivers☆1,169Updated last month
- Centralized resource for listing and organizing known injection techniques and POCs☆481Updated 3 weeks ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆296Updated 3 weeks ago
- A list of public attacks on BitLocker☆281Updated 2 months ago
- Signtool for expired certificates☆478Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,039Updated last year
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆369Updated 7 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆275Updated 9 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆960Updated this week
- Spartacus DLL/COM Hijacking Toolkit☆229Updated last year
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year