es3n1n / defendnotLinks
An even funnier way to disable windows defender. (through WSC api)
☆1,768Updated last week
Alternatives and similar repositories for defendnot
Users that are interested in defendnot are comparing it to the libraries listed below
Sorting:
- A slightly more fun way to disable windows defender + firewall. (through the WSC api)☆1,996Updated 11 months ago
- Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in …☆644Updated last week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,210Updated 6 months ago
- Stop Windows Defender programmatically☆970Updated 2 years ago
- Complete list of LPE exploits for Windows (starting from 2023)☆794Updated last month
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆666Updated 7 months ago
- Because AV evasion should be easy.☆730Updated 6 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,111Updated last year
- Windows Kernel Rootkit in Rust☆610Updated last week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,184Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆889Updated last week
- Tunnel TCP connections through a file☆929Updated 2 weeks ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,670Updated 7 months ago
- x64 binary obfuscator☆1,838Updated last year
- Win32 and Kernel abusing techniques for pentesters☆954Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,044Updated last year
- ☆1,659Updated 9 months ago
- Living Off The Land Drivers☆1,180Updated 3 weeks ago
- 🪅 Windows User Space Emulator☆2,214Updated this week
- Now You See Me, Now You Don't☆944Updated 5 months ago
- kill anti-malware protected processes ( BYOVD) ( Microsoft Won)☆945Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆753Updated 2 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆519Updated last week
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆516Updated 10 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,059Updated last week
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆766Updated last year
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,264Updated last month
- WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API☆574Updated 4 months ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆667Updated 9 months ago
- Original C Implementation of the Hell's Gate VX Technique☆1,054Updated 3 years ago