Repository navigation
windows-hardening
- Website
- Wikipedia
A collection of awesome security hardening guides, tools and other resources
HardeningKitty and Windows Hardening Settings
This Ansible role provides windows hardening configurations for the DevSec Windows baseline profile.
C# Based GUI for Windows-Optimize-Harden-Debloat
Windows and macOS Hardening Interface to make security more accessible.
A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benchmarks about hardening in Cybersecurity
Hardened Windows Server image
Barikade is a Windows Service to close processes running outside allowed directories followed by network connections blocking to prevent the use of legit software to bypass Windows Firewall and download malware.
IT Infrastructure Hardening Automation
This project will be used to create a program that can easily secure a Windows and Linux computer.
Identify and provide details on listening services in a Windows system
Directory for Windows ISO-Tweaks
Hardening and Auditing Windows OS.
This repository was designed to be a hands-on study aid for the CySA+ exam for particular domains and also strengthen my windows fundamentals within the security discipline.
This repository is focused on collecting, organizing, and maintaining security hardening guidelines, practices, and references for various environments. The objective is to provide a centralized knowledge base to improve system security, reduce attack surfaces, and follow best practices for cybersecurity.
WASP: Windows Audit & Security Profiler - PowerShell-based CIS compliance scanner for Windows Server with detailed security policy validation and reporting.
macOS menu bar replacement. Powered by yabai
Automated Windows 10/11 security hardening PowerShell script implementing defence-in-depth controls based on NIST, CIS, and Microsoft security baselines. Features include advanced firewall rules, ASR deployment, BitLocker enforcement, network protocol lockdown, exploit mitigation, and rollback-safe operations for enterprise or standalone deployment