mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings
synced 2026-05-05 11:01:50 +02:00
Add example to `disable windows defender` which uses MpCmdRun.exe to reset the current definitions. I recently used this and it was sufficient, that defender did not recognize previously flagged malicious files. It is quite helpful in case, that Set-MpPreference is not present or that the attacker is not allowed to adjust the service. |
||
|---|---|---|
| .. | ||
| Active Directory Attack.md | ||
| Bind Shell Cheatsheet.md | ||
| Cloud - AWS Pentest.md | ||
| Cloud - Azure Pentest.md | ||
| Cobalt Strike - Cheatsheet.md | ||
| Container - Docker Pentest.md | ||
| Escape Breakout.md | ||
| Hash Cracking.md | ||
| Linux - Persistence.md | ||
| Linux - Privilege Escalation.md | ||
| Metasploit - Cheatsheet.md | ||
| Methodology and enumeration.md | ||
| Miscellaneous - Tricks.md | ||
| MSSQL Server - Cheatsheet.md | ||
| Network Discovery.md | ||
| Network Pivoting Techniques.md | ||
| Office - Attacks.md | ||
| Reverse Shell Cheatsheet.md | ||
| Subdomains Enumeration.md | ||
| Windows - AMSI Bypass.md | ||
| Windows - Download and Execute.md | ||
| Windows - Mimikatz.md | ||
| Windows - Persistence.md | ||
| Windows - Post Exploitation Koadic.md | ||
| Windows - Privilege Escalation.md | ||
| Windows - Using credentials.md | ||