Visit Website

A collective resource of settings modifications (mostly opt-outs) that attempt to make Windows 10 as private and as secure as possible. Running Download all.bat, make any required modifications, and run the script as administrator. Reboot. Issues Group policy registry references often change after major updates. This requires updates to these scripts. Many of these modifications are mere opt-outs, and are not means to ensure Microsoft are unable to collect telemetry data. Privacy This collection of scripts does not collect any user data. License Copyright 2018 Aaron Horler Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and

FEATURES

ALTERNATIVES

Xcitium's unified zero-trust platform secures endpoints to cloud workloads using patented Zero Dwell technology, providing complete protection from ransomware and malware infections.

YARA-Endpoint is a client-server architecture tool that can be used for endpoint protection and incident response.

Code injection library for OS X with cross-architecture support.

OSSEC is a versatile HIDS known for its powerful log analysis and intrusion detection capabilities.

A collection of utilities for working with USB devices on Linux

All-in-one protection solution for individuals and families, offering antivirus, VPN, identity, and privacy protection.

Automated and flexible approach for deploying Windows 10 with security standards set by the DoD.

Android Loadable Kernel Modules for reversing and debugging on controlled systems/emulators.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved