If you have a need to disable defender but are unable to access the the machine while it’s in safe mode/need the ability to perform an unattended nuke (e.g remote VM on a VPS) then see below.
Requirements:
- The user account must be called “admin”
- The contents of the zip need to be placed within c:\temp\
- You need to have local admin rights on the machine
Instructions:
- Download the zip
- Extract the contents to C:\temp\
- Run the vbs script ‘Defender Nuke Services.vbs”
- Let the system go into safe mode to do it’s thing
- The machine should reboot back into normal mode within a minute
- RDP back on the device with the new password set
- Reset the password back to whatever you want for admin “net user admin <yourpassword>”.
The vbs along with the custom binary will do the following:
- Removes the password on the account “admin”
- Creates a service using NSSM called “DefenderNukeService” using DefenderNukeServices.exe
- Adds a registry key entry to boot service in safe mode
- Sets the machine into safemode and reboots
- Once in safemode the service DefenderNukeService starts DefenderNukeServices.exe
- Defenders registry keys are modified
- Bootmode is set back to normal
- Reset the password on the account “admin” to hj7gdn@!x
- Removes the registry key entry for the service to start in safe mode
- Stops and deletes the service DefenderNukeServices
- Reboots the machine within 10 seconds
p.s you might be wondering why I’ve included a copy of bcdedit in the zip. There is a bug with win32 cmd trying to access the 64 bit app bcdedit and im too lazy and cba to fix.
I’ll add it to the to-do list along with optimising the whole process in an upcoming new tool 😊

Checksum: 32414B626E4BED0A290CD86231F6D7537BB90EF9A70FC3896B0D9167948340A5