New 'Defendnot' Tool Exploits Windows API to Disable Microsoft Defender
A newly released tool named 'Defendnot' can disable Microsoft Defender on Windows systems by registering a fake antivirus product through an undocumented Windows Security Center (WSC) API. Developed by researcher es3n1n, Defendnot creates a dummy antivirus DLL and injects it into a trusted system process like Taskmgr.exe, allowing it to bypass security checks and trick Windows into deactivating Defender. Unlike its predecessor 'no-defender', which faced a DMCA takedown for using third-party antivirus code, Defendnot is built from scratch to avoid copyright issues. The tool includes a loader for configuration and establishes persistence via Windows Task Scheduler, raising concerns about potential misuse to leave systems unprotected.
Comments
Post a Comment