Last active
July 20, 2023 16:07
-
-
Save x9090/c464c4cecd25981fafe876f1bf5fe99c to your computer and use it in GitHub Desktop.
Breaking AV self-defense
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
http://www.fortiguard.com/zeroday/FG-VD-17-037 - Kaspersky Self-Defence Bypass | |
http://www.fortiguard.com/zeroday/FG-VD-17-019 - Bitdefender Kernel Driver Self-Protection Bypass | |
http://www.fortiguard.com/zeroday/FG-VD-17-018 - Bitdefender AVC3 Driver Local Privilege Escalation | |
http://www.fortiguard.com/zeroday/FG-VD-17-004 - Bypass Malwarebytes Self-Protection Module to Disable MBAMService | |
http://www.fortiguard.com/zeroday/FG-VD-17-003 - Malwarebytes Local Privilege Escalation Vulnerability | |
http://www.fortiguard.com/zeroday/FG-VD-16-080 - AVIRA IPC Server Multiple Out-of-bounds Write Vulnerabilities | |
http://www.fortiguard.com/zeroday/FG-VD-16-063 - AVIRA Self-Protection Bypass via registry removal | |
http://www.fortiguard.com/zeroday/FG-VD-16-062 - AVG Self-protection Bypass by disabling AV update | |
http://www.fortiguard.com/zeroday/FG-VD-16-061 - Multiple Denial-of-Service Vulnerabilities in AvastSvc Core Service | |
http://www.fortiguard.com/zeroday/FG-VD-16-060 - Avast Security Product Registry Bypass Vulnerability |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment