es3n1n / no-defenderLinks
A slightly more fun way to disable windows defender + firewall. (through the WSC api)
☆1,996Updated last year
Alternatives and similar repositories for no-defender
Users that are interested in no-defender are comparing it to the libraries listed below
Sorting:
- An even funnier way to disable windows defender. (through WSC api)☆1,768Updated last week
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,210Updated 6 months ago
- Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in …☆644Updated last week
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆1,995Updated last month
- Complete list of LPE exploits for Windows (starting from 2023)☆794Updated last month
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,117Updated last year
- HVNC for Cobalt Strike☆1,226Updated last year
- kill anti-malware protected processes ( BYOVD) ( Microsoft Won)☆945Updated last year
- Stop Windows Defender programmatically☆970Updated 2 years ago
- poc for CVE-2024-38063 (RCE in tcpip.sys)☆667Updated 9 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆666Updated 7 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,670Updated 7 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,369Updated last year
- Collection of various malicious functionality to aid in malware development☆1,669Updated last year
- UAC bypass for x64 Windows 7 - 11☆807Updated 2 years ago
- Microsoft-Outlook-Remote-Code-Execution-Vulnerability☆727Updated last year
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆941Updated last year
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆770Updated last year
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,939Updated 2 months ago
- Syscall Shellcode Loader (Work in Progress)☆1,196Updated last year
- ☆1,003Updated this week
- ☆1,973Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,184Updated last year
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,264Updated last month
- Windows Kernel Rootkit in Rust☆610Updated last week
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- Living Off The Land Drivers☆1,190Updated 3 weeks ago
- BlackLotus UEFI Windows Bootkit☆2,070Updated last year
- Stealing Signatures and Making One Invalid Signature at a Time☆2,241Updated 3 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,435Updated 10 months ago