
Security researcher Arsenii es3n1n has released a security tool named Defendnot—an experimental utility that disables Windows Defender by directly registering itself as an antivirus solution via the Windows Security Center (WSC).
While security researchers have long analyzed ways to interact with or bypass Defender, Defendnot takes a novel approach: it communicates directly with the WSC API, which is undocumented and requires an NDA with Microsoft to access official documentation.
At its core, Defendnot leverages the Windows Security Center (WSC) service. The WSC is a core component of Windows that allows antivirus software to register itself with the operating system. This registration informs Windows that an alternative antivirus solution is present, prompting it to disable Windows Defender to avoid conflicts.
Previous attempts to programmatically disable Windows Defender, such as the “no-defender” tool, relied on “thirdparty code provided by other AVs to register itself in the WSC.” In contrast, “defendnot interacts with WSC directly,” taking a more direct approach to the process.

However, “defendnot” comes with a limitation. To ensure that Windows Defender remains disabled even after a system reboot, “defendnot adds itself to the autorun.” This means that the “defendnot binaries” must remain on the user’s disk.
Arsenii’s full write-up details the mechanism and includes a working Proof of Concept (PoC) on GitHub. The tool is intended strictly for research and educational purposes, and should not be deployed in production or offensive scenarios.
Related Posts:
- New Loki Backdoor Emerges: A Private Agent for Mythic Framework Unveiled
- Israel uses Pegasus spyware to track hostages in Gaza
- China’s Cyber Espionage Actors Employ ORB Networks to Evade Detection
- Critical Flaw Exposes Linux Security Blind Spot: io_uring Bypasses Detection
- Weaponizing Windows Defender: New Attack Bypasses EDR