Windows Defender Bypass to Reverse Shell

#$ubh@nk@r
3 min readOct 19, 2024

--

Intro : Hello Hackers!!😀 what’s up. Today I will show you how to Bypass Windows Defender to catch a Reverse Shell in your Kali Host. Here we will use Nim Reverse Shell then compile it to Windows Executable File. So let’s start.

Nim Installation :

So here we will use this Github Repo for Nim Shell.

Now we have to install Nim to compile it. So need the Nim Installer first.

$ wget https://github.com/dom96/choosenim/releases/download/v0.8.4/choosenim-0.8.4_linux_amd64

Now we have execute the below Command to make the Nim Binary File.

$ ./nim update stable

So it will store in below Directory.

/home/simon/.nimble/bin

Here is the Command.

Making Payload :

Then execute the following command to create an exe file. Here I named it Update.exe.

$ ./nim c -d:mingw --app:gui --opt:speed -o:Update.exe ../../Desktop/rev.nim

Then set your Netcat Listener.

Next transfer the in your Windows Host. Note that Windows Defender must be Enabled.

Now run it and you will hopefully get a Reverse Shell in your Kali VM without any Defender interruption.

So that’s it for today. Hope you learn something new!!

Thanks to TylerRamsbey for his Excellent Video Explanation. Must watch!!

THANKS FOR READING!

If you enjoy this don’t forget to Like it and Follow me for more Articles.

Linkedin Profile → https://www.linkedin.com/in/subhankar-paul-332085254/

Happy Hacking~

--

--