Skip to content

Powershell scripts for making your Windows System secured against Ransomeware threats!

License

Notifications You must be signed in to change notification settings

ransomewareimmunityproject/powershell-scripts

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

powershell-scripts

Powershell scripts for making your Windows System secured against Ransomeware threats! This scripts allow an administrator to harden the Windows Environment

Instruction:

Read the comments in powershell code before executing them

Usage

Run this scripts using powershell

What above powershell scripts IS NOT

  1. It does NOT prevent software from being exploited
  2. It does NOT prevent the abuse of every available risky feature.
  3. It does NOT prevent the changes it implements from being reverted. If malicious code runs on the system and it is able to restore them, the premise of the tool is defeated

Is this script follows Zero Trust principle or not?

yes, this script enforces Zero Trust to a certain level supported by OS

Inbuilt Security Feature used by this scripts

  1. Applocker
  2. WDAC
  3. Group Policy
  4. MS Defender

version supports

All of the scripts run latest Windows 11 , Windows 10 and latest version of Windows server edition and some of these script won't run on older version of Windows

Note

  1. Use this scripts with care and modify these scripts according to your system and environment
  2. Always install an Antivirus or Windows Defender along with these scripts

Scripts and its purpose

  1. Enable_ASR.ps1 - This script enables Attack Surface Reduction modules in Windows

  2. Enable_netprotection.ps1 - this script enables network protection of Windows Defender

  3. Block_lolbins.ps1 - This script blocks certain executable in system32 missused by malware

  4. block-modification-services.ps1 - This script block modification of Windows services

  5. block-sctask.ps1 - This script disable scheduled task creation

  6. block_debug_exe.ps1 - This script blocks executables compiled in debug mode from execution

  7. block_unsigned_exe.ps1 - This script block executables which are not signed from execution

  8. block_write_autorun.ps1 - This script block process from modification of autorun in registry

  9. disable-cmd.ps1 - This script blocks cmd.exe

  10. disable-powershell.ps1 - This script blocks powershell.exe (Run this script at last)

  11. enable-protected-folder.ps1 - This script enable protected folder

  12. restrict-dll.ps1 - This script allow dll loading from program files directory only

  13. restrict-exe.ps1 - This script allow exe loading from program files directory only

  14. restrict-download.ps1 - This script blocks downloads in edge and internet explorer

  15. Whitelist_lolbins.ps1 - This script whitelist blocked certain executable in system32 missused by malware

  16. harden_step1.ps1 - This script witll do the following

    1. Disable Remote Desktop
    2. Send NTLMv2 response only/refuse LM and NTLM
    3. Do not allow anonymous enumeration of SAM accounts and shares
    4. Restrict Anonymous Access
    5. Disable IE Password Cache
    6. Disable Edge Password Cache
  17. harden_step4.ps1: This script hardens the Office

Supplement software

https://github.com/securitywithoutborders/hardentools Thanks @securitywithoutborders for harden

Run Hardentool before Runing these scripts and Run only scripts who features are not covered by Hardentools

About

Powershell scripts for making your Windows System secured against Ransomeware threats!

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published