Absolute uninstaller reddit12/10/2023 Powershell -ExecutionPolicy ByPass -File %SOURCE%\CrappyAVUninstall.ps1Įcho Installing NewAV! Hopefully it doesn't suck! IF NOT EXIST "%ProgramFiles%\%NEW_ENDPOINT%" GOTO INSTALL IF NOT EXIST "%ProgramFiles(x86)%\%NEW_ENDPOINT%" GOTO INSTALL IF "%PROCESSOR_ARCHITECTURE%" = "x86" GOTO X86_PROG Open up control panels programs and use the Name field from there. If your users are local admins, you can even deploy via email if that's what you're into. there's plenty like Sophos that give you the finger and give you a shitty script written by one of the support guys that googled how to uninstall X.įor your specific application, usually there's still an MSIexec, but its hidden because "Security" here is my solution as long as it shows up in control panel: It can be deployed via whatever method you want. This should be essential for even considering them. A lot of the good vendors will have a "Rip and replace" solution. Etc.Īntivirus vendors need to get their shit together. You can't guarantee the path of the system, what if its 32 bit, what if the system drive isn't C. You can't guarantee the paths of registry values, they can change. There's one major problem with approaches like this. I have gone down this rabbithole for vendors of software that can't get their shit together. I spend a lot of time automating installation and uninstallation of software that. If it's possible to be done for this software, this will help also to uninstall any software that doesn't have a silent uninstall string in the future. I wonder if I can rebuild these actions into a script to use it to uninstall this antivirus, to run it on every machine remotely. Lately, I was learning some reverse-engineering tools, and I found some handy tools that will help me with various tasks, so I decided to use some of them in this scenario.įirst, I used "Procmon" to capture the uninstallation process of this software, then I exported the logs and loaded them into "ProcDOT" which is a great tool to read Procmon log files, and visualize any process you select into a beautiful graph, to track all the actions that have been done for that process (Which in this scenario will be the uninstall.exe file). I'm working remotely with a big company, which has "360 Total Security" installed on 100+ devices, and I'm supporting them remotely to install an alternative that suits their business, but the problem is that "360 Total Security" doesn't have a silent uninstallation string and the registry value for UninstallString is "C:\Program Files (x86)\360\Total Security\Uninstall.exe". I have a scenario that is quite interesting for every sysadmin/security engineer.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |