Defeat-Defender : Powerful Batch Script To Dismantle Complete Windows Defender Protection

Defeat-Defender is a powerfull batch file to disable windows defender,firewall,smartscreen and execute the payload.

Usage

  1. Edit Defeat-Defender.bat on this line https://github.com/swagkarna/Defeat-Defender/blob/93823acffa270fa707970c0e0121190dbc3eae89/Defeat-Defender.bat#L72 and replace the direct url of your payload
  2. Run the script “run.vbs” . It will ask for Admin Permission.If permission Granted The script will work Silently without console windows…

After It Got Admin Permission It Will Disable Defender

  1. PUAProtection
  2. Automatic Sample Submission
  3. Windows FireWall
  4. Windows Smart Screen(Permanently)
  5. Disable Quickscan
  6. Add exe file to exclusions in defender settings
  7. Disable Ransomware Protection

Virus Total Result[8/04/2021]

Bypasssing Windows-Defender Techniques

Recently Windows Introduced new Feature called “Tamper Protection”.Which Prevents the disable of real-time protection and modifying defender registry keys using powershell or cmd…If you need to disable real-time protection you need to do manually….But We will disable Real Time Protection using NSudo without trigerring Windows Defender

After Running Defeat-Defender Script

Tested on Windows Version 20H2

Behind The Scenes

When Batch file is executed it ask for admin permissions.After getting admin privileage it starts to disable windows defender real time protectin , firewall , smartscreen and starts downloading our backdoor from server and it will placed in startup folder.The backdoor will be executed after it has downloaded from server..And will be started whenever system starts..

Check Out This Article : https://secnhack.in/create-fud-fully-undetectable-payload-for-windows-10/

Note: If you want to enable Defender Smart Screen.Use Smart Screen.bat file..

Disclaimer

Use this only for educational Purpose.

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

2 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago