Skip to content
#

defender-bypass

Here are 23 public repositories matching this topic...

The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via a netcat-like session. This tool is designed to work on both Linux and Windows systems. Notably, it has been engineered to bypass popular antivirus software such as Microsoft Defender, Bitdefender, and Kaspersky.

  • Updated Jul 18, 2024
  • Python

🌐 [ New Chrome Cookies ] AVM-Tools - Advanced FUD Stealer. Features: Credential Extraction (Passwords, Cookies, Autofill), Discord Session Recovery, Crypto-Wallet Audit & Game Config Backup. Supports: Instagram, Twitter, TikTok, Twitch, Spotify, Filezilla, Reddit & more. Educational Security Research Tool.

  • Updated Feb 14, 2026
  • JavaScript

Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.

  • Updated Feb 21, 2026
  • Visual Basic .NET

Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.

  • Updated Feb 21, 2026
  • Visual Basic .NET

Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.

  • Updated Feb 21, 2026
  • Visual Basic .NET

Improve this page

Add a description, image, and links to the defender-bypass topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the defender-bypass topic, visit your repo's landing page and select "manage topics."

Learn more