Hacking Tools

SharpExclusionFinder – Streamlining Windows Defender Exclusion Checks With Advanced Scanning Capabilities

This C# program finds Windows Defender folder exclusions using Windows Defender through its command-line tool (MpCmdRun.exe).

The program processes directories recursively, with configurable depth and thread usage, and outputs information about exclusions and scan progress.

The program allows you to:

  • Scan for folder exclusions up to a specified depth, without relying on event logs or admin permissions.
  • Use multi-threading to speed the scan process.
  • Log errors and exclusion messages to a specified output file.

Usage

Basic Command

program.exe <BasePath> [options]

Options:

  • --max-threads N: Set the maximum number of threads to use for scanning. Default is 3.
  • --depth N: Specify the maximum directory depth to scan. Depth 1 means only immediate subdirectories.
  • --output <filePath>: Specify a file path to log exclusions and errors.
  • -h, --help: Display help and usage information.

Example:

program.exe "C:\MyDirectory" --max-threads 5 --depth 3 --output scan_log.txt

This will scan C:\MyDirectory up to a depth of 3 subdirectories, using 5 threads, and log any exclusions or errors to scan_log.txt.

How It Works

A blog explaining the technique utilised can be viewed here

Example Output

Processed 2000 directories. Time elapsed: 23.78 seconds.
[+] Folder C:\users\user\Example is excluded
Processed 2500 directories. Time elapsed: 30.77 seconds.

Prerequisites

  • .NET Framework 4.5.2 or later.
  • Windows Defender must be installed and enabled on the system.
  • MpCmdRun.exe must be located at C:\Program Files\Windows Defender\MpCmdRun.exe.
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 week ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

3 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

3 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

3 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

3 weeks ago