Skip to content

MustafaNafizDurukan/DefenderCheck

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

39 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DefenderCheck

Quick tool to help make evasion work a little bit easier.

Warning: As of the 1.337.157.0 Defender signature update, DefenderCheck is classified as VirTool:MSIL/BytzChk.C!MTB. As a workaround while I work to get around this, please disable Real-time Protection in Defender before compiling DefenderCheck.

Takes a binary as input and splits it until it pinpoints that exact byte that Microsoft Defender will flag on, and then prints those offending bytes to the screen. This can be helpful when trying to identify the specific bad pieces of code in your tool/payload.

Note: Defender must be enabled on your system, but the realtime protection and automatic sample submission features should be disabled.

Changes in This Fork

  • Custom tempDir Support: You can now specify a custom temporary directory when running DefenderCheck.
    • By default, the tool uses C:\Temp.
    • If you supply a second argument to DefenderCheck, that path will be used instead.

Usage Example (New Custom Directory)

# Default usage (uses C:\Temp):
.\DefenderCheck.exe C:\Temp\mimikatz.exe

# Specify a custom temporary directory:
.\DefenderCheck.exe C:\Temp\mimikatz.exe D:\MyCustomTemp

Where:

  • C:\Temp\mimikatz.exe is the binary you want DefenderCheck to analyze.
  • D:\MyCustomTemp is your optional override for the temp folder.

About

Identifies the bytes that Microsoft Defender flags on.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C# 100.0%