Skip to content

Powerful tool designed to disable specific Windows Defender settings using registry modifications and PowerShell commands. This tool is intended for educational purposes, allowing users to understand how certain configurations within Windows Defender can be programmatically managed.

License

Notifications You must be signed in to change notification settings

prajxwal/WindowsDefenderBypass-csharp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

WindowsDefenderBypass-c#

Description

This tool disables certain Windows Defender settings using registry modifications and PowerShell commands. It's designed for educational purposes to demonstrate how these configurations can be managed programmatically.

Disclaimer: This program is distributed for educational purposes only. Modifying system settings and disabling security features should only be done responsibly and with appropriate permissions.

Features

  • Disables Windows Defender settings:
    • DisableRealtimeMonitoring
    • DisableBehaviorMonitoring
    • DisableBlockAtFirstSeen
    • DisableIOAVProtection
    • DisableScriptScanning
    • SubmitSamplesConsent
    • MAPSReporting
    • HighThreatDefaultAction
    • ModerateThreatDefaultAction
    • LowThreatDefaultAction
    • SevereThreatDefaultAction

Usage

  1. Ensure you have administrative privileges.
  2. Compile and run the program.
  3. The program will prompt for administrative privileges if not already running with them.
  4. Once executed, it will modify the Windows Defender settings using registry modifications and PowerShell commands.

Features

  • Disables Windows Defender settings:
    • DisableRealtimeMonitoring
    • DisableBehaviorMonitoring
    • DisableBlockAtFirstSeen
    • DisableIOAVProtection
    • DisableScriptScanning
    • SubmitSamplesConsent
    • MAPSReporting
    • HighThreatDefaultAction
    • ModerateThreatDefaultAction
    • LowThreatDefaultAction
    • SevereThreatDefaultAction

Usage

  1. Ensure you have administrative privileges.
  2. Compile and run the program.
  3. The program will prompt for administrative privileges if not already running with them.
  4. Once executed, it will modify the Windows Defender settings using registry modifications and PowerShell commands.

How to Run

License

This project is licensed under the MIT License. See the LICENSE file for details.

Disclaimer

This program is distributed for educational purposes only. It is intended to demonstrate how certain Windows Defender settings can be modified programmatically. Use responsibly and only on systems where you have permission to make these changes.

About

Powerful tool designed to disable specific Windows Defender settings using registry modifications and PowerShell commands. This tool is intended for educational purposes, allowing users to understand how certain configurations within Windows Defender can be programmatically managed.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages