Update README.md
This commit is contained in:
parent
319c79293a
commit
ee1374845d
12
README.md
12
README.md
@ -1,4 +1,4 @@
|
||||
# HardenSysvol: Scan Sysvol Vulnerabilities in Active Directory
|
||||
# HardenSysvol: Inspect AD Sysvol Vulnerabilities in Under 5 Minutes
|
||||
|
||||

|
||||

|
||||
@ -6,16 +6,14 @@
|
||||

|
||||

|
||||
|
||||
|
||||
Support this project ❤️ [PayPal](https://www.paypal.com/paypalme/mdunca13)
|
||||
|
||||
## 🚧 Project Status: In Progress
|
||||
|
||||
## Description
|
||||
*Hardensysvol* is a PowerShell module designed to enhance Active Directory (AD) security by analyzing and detecting threats within the Sysvol folder. It scans for sensitive keywords, identifies suspicious files, and generates a detailed HTML report for easier filtering.
|
||||
|
||||
Easy to use, with only two commands to install and run scans supporting over 50 extensions, binary checks for more than 40 types, and more.
|
||||
|
||||
Hardensysvol can be used for AD audits or pentesting, complementing existing solutions such as PingCastle, PurpleKnight, and GPOZaurr.
|
||||
*HardenSysvol* is free PowerShell Module designed to quickly scan one of Active Directory's most critical folders, Sysvol, with just one command, no major prerequisites, and no elevated rights. It detects suspicious binaries from over 180 standard extensions, identifies vulnerabilities, and searches for default or custom keywords.
|
||||
This tool complements audit solutions like PurpleKnight, PingCastle, and GPOZaurr by offering deeper insights into Sysvol content often overlooked by other tools. HardenSysvol is ideal for AD audits and pentesting.
|
||||
|
||||
<a href="https://dakhama-mehdi.github.io/Harden-Sysvol/Exemples_HTML/hardensysvol.html#Tab-zqtd4y6c" target="_blank">View Example HTML Page</a>
|
||||
|
||||
@ -23,7 +21,7 @@ Hardensysvol can be used for AD audits or pentesting, complementing existing sol
|
||||
|
||||
| **Feature** | **Description** | **Supported File Types** |
|
||||
|-------------------------------------|----------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------|
|
||||
| **Binary Comparison** | Analyzes and compares well-known binaries with the ability to extend to additional signatures to detect suspicious files. | All binary types (EXE, DLL, MSI, etc.) with customizable signature extension. |
|
||||
| **Binary Comparison** | Analyzes and compares well-known binaries with the ability to extend to additional signatures to detect suspicious files. | All binary types (EXE, DLL, MSI, etc.) with customizable signature extension support 180 extensions listed below . |
|
||||
| **Keyword Search** | Searches for sensitive keywords such as passwords and usernames across a wide variety of files. | Pdf, docx, xlsx, doc, xls, pptx, ods, odt, odp, bat, reg, ps1, vbs, py, xml, and other scripts. |
|
||||
| **Certificate Verification** | Verifies certificates protected by password or containing exportable private keys. | PFX, CER, DER, PEM, P7B certificates. |
|
||||
| **Steganography** | Analyzes images to detect hidden files by searching for file signatures like EXE, ZIP, etc. | Images (JPEG, PNG, BMP, GIF, etc.) and hidden files (EXE, MSI, ZIP, RAR, 7z). |
|
||||
|
Loading…
x
Reference in New Issue
Block a user