Robust and practical application control for Windows
☆686Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for AaronLocker
Users that are interested in AaronLocker are comparing it to the libraries listed below
Sorting:
- Documentation and tools to access Windows Defender Application Control (WDAC) technology.☆256Feb 5, 2026Updated 3 weeks ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,370Feb 10, 2026Updated 2 weeks ago
- Directory Services Internals (DSInternals) PowerShell Module and Framework☆1,901Feb 9, 2026Updated 2 weeks ago
- Configuration guidance for implementing application whitelisting with AppLocker. #nsacyber☆232Oct 31, 2025Updated 4 months ago
- EventList☆377Mar 21, 2021Updated 4 years ago
- The goal of this repository is to document the most common techniques to bypass AppLocker.☆2,044Sep 11, 2023Updated 2 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆201Dec 11, 2017Updated 8 years ago
- Intune managed Secured workstation☆258Aug 13, 2024Updated last year
- Tooling for assessing an Azure AD tenant state and configuration☆830Jun 12, 2024Updated last year
- A repository for using windows event forwarding for incident detection and response☆1,296Sep 8, 2025Updated 5 months ago
- A repository of sysmon configuration modules☆2,980Aug 21, 2024Updated last year
- A PowerShell module to facilitate building, configuring, deploying, and auditing Windows Defender Application Control (WDAC) policies☆240Mar 2, 2022Updated 3 years ago
- A web site for managing access to local admin passwords managed by Microsoft LAPS☆146Aug 19, 2023Updated 2 years ago
- HardeningKitty and Windows Hardening Settings☆2,591Updated this week
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆283Nov 28, 2022Updated 3 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Dec 20, 2019Updated 6 years ago
- ☆265Oct 25, 2025Updated 4 months ago
- Collection of Intune policies that could assist with implementing ACSC's Windows hardening guidance.☆323Apr 26, 2024Updated last year
- PowerShell Deployment☆668Feb 18, 2026Updated last week
- Logging Made Easy☆710Nov 1, 2023Updated 2 years ago
- Sysmon configuration file template with default high-quality event tracing☆5,401Jul 3, 2024Updated last year
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆883Nov 17, 2020Updated 5 years ago
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,634Mar 4, 2025Updated 11 months ago
- Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.☆2,916Updated this week
- CA Optics - Azure AD Conditional Access Gap Analyzer☆334Aug 28, 2024Updated last year
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆270Feb 12, 2026Updated 2 weeks ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,790Jan 7, 2020Updated 6 years ago
- Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may…☆1,158Feb 18, 2026Updated last week
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,051Feb 17, 2022Updated 4 years ago
- Utilities for Sysmon☆1,574Sep 21, 2025Updated 5 months ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆114May 27, 2017Updated 8 years ago
- ☆319Feb 9, 2020Updated 6 years ago
- Contact: CRT@crowdstrike.com☆746Apr 27, 2023Updated 2 years ago
- Azure Local (formerly Azure Stack HCI), Windows 10 and Windows Server rapid lab deployment scripts☆1,283Oct 21, 2025Updated 4 months ago
- Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber☆1,595Dec 24, 2022Updated 3 years ago
- PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.☆915Feb 28, 2024Updated 2 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆160Mar 27, 2023Updated 2 years ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆924Mar 7, 2025Updated 11 months ago
- This script will enable you to reset the krbtgt account password and related keys while minimizing the likelihood of Kerberos authenticat…☆456Mar 7, 2024Updated last year