This tool disables certain Windows Defender settings using registry modifications and PowerShell commands. It's designed for educational purposes to demonstrate how these configurations can be managed programmatically.
Disclaimer: This program is distributed for educational purposes only. Modifying system settings and disabling security features should only be done responsibly and with appropriate permissions.
- Disables Windows Defender settings:
- DisableRealtimeMonitoring
- DisableBehaviorMonitoring
- DisableBlockAtFirstSeen
- DisableIOAVProtection
- DisableScriptScanning
- SubmitSamplesConsent
- MAPSReporting
- HighThreatDefaultAction
- ModerateThreatDefaultAction
- LowThreatDefaultAction
- SevereThreatDefaultAction
- Ensure you have administrative privileges.
- Compile and run the program.
- The program will prompt for administrative privileges if not already running with them.
- Once executed, it will modify the Windows Defender settings using registry modifications and PowerShell commands.
- Disables Windows Defender settings:
- DisableRealtimeMonitoring
- DisableBehaviorMonitoring
- DisableBlockAtFirstSeen
- DisableIOAVProtection
- DisableScriptScanning
- SubmitSamplesConsent
- MAPSReporting
- HighThreatDefaultAction
- ModerateThreatDefaultAction
- LowThreatDefaultAction
- SevereThreatDefaultAction
- Ensure you have administrative privileges.
- Compile and run the program.
- The program will prompt for administrative privileges if not already running with them.
- Once executed, it will modify the Windows Defender settings using registry modifications and PowerShell commands.
- Clone the repository: git clone https://github.com/prajxwal/WindowsDefenderBypass-c-.git
- Open the solution in Visual Studio or compile using the command line:
- Run the compiled executable
Program.exe
with administrative privileges.
This project is licensed under the MIT License. See the LICENSE file for details.
This program is distributed for educational purposes only. It is intended to demonstrate how certain Windows Defender settings can be modified programmatically. Use responsibly and only on systems where you have permission to make these changes.