☆13May 30, 2025Updated 9 months ago
Alternatives and similar repositories for Exploit-Protection-policy
Users that are interested in Exploit-Protection-policy are comparing it to the libraries listed below
Sorting:
- Windows 10/11 Security & Privacy Hardening☆37Nov 24, 2025Updated 3 months ago
- Active Directory Tiered Administration Model☆18Aug 2, 2025Updated 7 months ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- Tier 1 Just-In-Time☆12Sep 6, 2025Updated 6 months ago
- Custom ADMX template focused on hardening Windows 10 & Windows 11 systems☆93Updated this week
- ☆43May 22, 2021Updated 4 years ago
- Guidance and collateral for troubleshooting and managing Azure Sentinel data costs.☆28Oct 9, 2023Updated 2 years ago
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- ☆11Feb 26, 2026Updated 3 weeks ago
- Harden Windows with Windows Defender Application Control (WDAC)☆48Jul 26, 2024Updated last year
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆29Jul 26, 2024Updated last year
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆13Jan 24, 2026Updated last month
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- Just-In-time Active Directory solution☆32Sep 3, 2025Updated 6 months ago
- Bulk turn on Analytic rules in Azure Sentinel☆19Oct 7, 2021Updated 4 years ago
- Think of this PS-module as a helper for Microsoft Graph version-management, connectivity and data management using Microsoft Graph.☆14Apr 28, 2025Updated 10 months ago
- ☆16Mar 12, 2026Updated last week
- Hints for the Kusto Detective Agency - Season 2☆10Aug 15, 2023Updated 2 years ago
- AppLocker baseline configuration with the AaronLocker module. Used for testing with Windows 10, Intune etc.☆21Nov 21, 2025Updated 4 months ago
- Miscellaneous Azure Sentinel files that don't fall into other categories.☆13Aug 23, 2021Updated 4 years ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆10Dec 13, 2018Updated 7 years ago
- Azure OpenAI Playbook created for Microsoft Sentinel☆13May 2, 2024Updated last year
- Windows 10 AME script, sliced and diced.☆11Oct 1, 2021Updated 4 years ago
- Repository with scripts that could be used for AD helath check activities.☆19Jan 4, 2022Updated 4 years ago
- ☆22Oct 21, 2024Updated last year
- Epsylon Tech's recommended tools for optimizing Windows 10 for both performance and privacy.☆11Mar 4, 2020Updated 6 years ago
- Maintain Tier 0 users. This script take care all Tier 0 users are in the correct OU or in the default user container and add the Kerberos…☆65Apr 1, 2025Updated 11 months ago
- Administrative Template (ADMX) for Microsoft Defender Attack Surface Reduction (ASR)☆15Jul 7, 2025Updated 8 months ago
- Security even with a small budget - there is no excuse!☆20May 24, 2023Updated 2 years ago
- ☆21Dec 16, 2024Updated last year
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆19Jul 26, 2025Updated 7 months ago
- This tool is designed to assist you in analyzing issues related to Defender for Endpoint on your local endpoint. It offers a centralized …☆99Mar 11, 2026Updated last week
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- Enhance the security and compliance of your standalone Windows servers with our STIG script, specifically designed to meet DoD STIG/SRG r…☆66Jul 26, 2024Updated last year
- This repository will be publicly available☆22Jan 27, 2026Updated last month
- Scans NTFS permissions and ensures that BUILTIN\Administrators and NT AUTHORITY\SYSTEM have full control to every file and folder☆45Feb 8, 2025Updated last year
- Tools and information regarding Windows Kerberos cryptography☆39Jan 28, 2026Updated last month