Defeat-Defender : Powerful Batch Script To Dismantle Complete Windows Defender Protection

Defeat-Defender is a powerfull batch file to disable windows defender,firewall,smartscreen and execute the payload.

Usage

  1. Edit Defeat-Defender.bat on this line https://github.com/swagkarna/Defeat-Defender/blob/93823acffa270fa707970c0e0121190dbc3eae89/Defeat-Defender.bat#L72 and replace the direct url of your payload
  2. Run the script “run.vbs” . It will ask for Admin Permission.If permission Granted The script will work Silently without console windows…

After It Got Admin Permission It Will Disable Defender

  1. PUAProtection
  2. Automatic Sample Submission
  3. Windows FireWall
  4. Windows Smart Screen(Permanently)
  5. Disable Quickscan
  6. Add exe file to exclusions in defender settings
  7. Disable Ransomware Protection

Virus Total Result[8/04/2021]

Bypasssing Windows-Defender Techniques

Recently Windows Introduced new Feature called “Tamper Protection”.Which Prevents the disable of real-time protection and modifying defender registry keys using powershell or cmd…If you need to disable real-time protection you need to do manually….But We will disable Real Time Protection using NSudo without trigerring Windows Defender

After Running Defeat-Defender Script

Tested on Windows Version 20H2

Behind The Scenes

When Batch file is executed it ask for admin permissions.After getting admin privileage it starts to disable windows defender real time protectin , firewall , smartscreen and starts downloading our backdoor from server and it will placed in startup folder.The backdoor will be executed after it has downloaded from server..And will be started whenever system starts..

Check Out This Article : https://secnhack.in/create-fud-fully-undetectable-payload-for-windows-10/

Note: If you want to enable Defender Smart Screen.Use Smart Screen.bat file..

Disclaimer

Use this only for educational Purpose.

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

10 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

10 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago