Defeat-Defender : Powerful Batch Script To Dismantle Complete Windows Defender Protection

Defeat-Defender is a powerfull batch file to disable windows defender,firewall,smartscreen and execute the payload.

Usage

  1. Edit Defeat-Defender.bat on this line https://github.com/swagkarna/Defeat-Defender/blob/93823acffa270fa707970c0e0121190dbc3eae89/Defeat-Defender.bat#L72 and replace the direct url of your payload
  2. Run the script “run.vbs” . It will ask for Admin Permission.If permission Granted The script will work Silently without console windows…

After It Got Admin Permission It Will Disable Defender

  1. PUAProtection
  2. Automatic Sample Submission
  3. Windows FireWall
  4. Windows Smart Screen(Permanently)
  5. Disable Quickscan
  6. Add exe file to exclusions in defender settings
  7. Disable Ransomware Protection

Virus Total Result[8/04/2021]

Bypasssing Windows-Defender Techniques

Recently Windows Introduced new Feature called “Tamper Protection”.Which Prevents the disable of real-time protection and modifying defender registry keys using powershell or cmd…If you need to disable real-time protection you need to do manually….But We will disable Real Time Protection using NSudo without trigerring Windows Defender

After Running Defeat-Defender Script

Tested on Windows Version 20H2

Behind The Scenes

When Batch file is executed it ask for admin permissions.After getting admin privileage it starts to disable windows defender real time protectin , firewall , smartscreen and starts downloading our backdoor from server and it will placed in startup folder.The backdoor will be executed after it has downloaded from server..And will be started whenever system starts..

Check Out This Article : https://secnhack.in/create-fud-fully-undetectable-payload-for-windows-10/

Note: If you want to enable Defender Smart Screen.Use Smart Screen.bat file..

Disclaimer

Use this only for educational Purpose.

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

2 weeks ago