WindowsAttackSurfaceAnalyzer.psd1
|
# # Module manifest for module 'WindowsAttackSurfaceAnalyzer' # # Generated by: Igor Dunaev / NubleX # Generated on: 2026-02-20 # @{ # Script module or binary module file associated with this manifest RootModule = 'WindowsAttackSurfaceAnalyzer.psm1' # Version number of this module - keep in sync with the script version ModuleVersion = '0.4.0' # Supported PSEditions CompatiblePSEditions = @('Desktop', 'Core') # ID used to uniquely identify this module GUID = 'a3f1c2d4-7e8b-4a9f-b2c3-d4e5f6a7b8c9' # Author of this module Author = 'Igor Dunaev' # Company or vendor of this module CompanyName = 'NubleX' # Copyright statement for this module Copyright = '(c) 2025-2026 Igor Dunaev / NubleX. All rights reserved.' # Description of the functionality provided by this module Description = 'Comprehensive Windows security posture analysis and attack surface assessment tool. Covers 23 security categories including hardware security (TPM/VBS/Secure Boot), BitLocker, Microsoft Defender ASR rules, exploit protection, privacy settings, network security, remote access, WSL, PowerShell security, authentication policy, scheduled tasks, and Windows 11-specific features. Generates HTML, JSON, and CSV reports. Designed for home users, IT professionals, and security researchers. Works on Windows 10 and all versions of Windows 11.' # Minimum version of PowerShell required PowerShellVersion = '5.1' # Minimum version of the common language runtime (CLR) required # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Functions to export from this module FunctionsToExport = @('Invoke-WindowsAttackSurfaceAnalyzer') # Cmdlets to export from this module CmdletsToExport = @() # Variables to export from this module VariablesToExport = @() # Aliases to export from this module AliasesToExport = @('Invoke-WASA') # Private data to pass to the module specified in RootModule PrivateData = @{ PSData = @{ # Tags applied to this module for discoverability Tags = @( 'Security', 'Windows', 'Windows10', 'Windows11', 'AttackSurface', 'Hardening', 'Assessment', 'Defender', 'BitLocker', 'TPM', 'VBS', 'ASR', 'PowerShell', 'Audit', 'Compliance', 'CyberSecurity', 'BlueTeam', 'DFIR', 'PSEdition_Desktop', 'PSEdition_Core', 'Windows' ) # A URL to the license for this module LicenseUri = 'https://github.com/NubleX/Windows-Attack-Surface-Analyzer/blob/main/LICENSE' # A URL to the main website for this project ProjectUri = 'https://github.com/NubleX/Windows-Attack-Surface-Analyzer' # A URL to an icon representing this module IconUri = '' # ReleaseNotes for this version ReleaseNotes = @' v0.4.0 (Release Candidate) - Expanded to 23 security categories - Added per-rule ASR breakdown with friendly names - Added ASLR, SEHOP, CFG, Heap protection via Get-ProcessMitigation - Added Privacy Settings: diagnostic data, advertising ID, camera/mic/location permissions - Added Network Security: IPv6, DNS-over-HTTPS, Wi-Fi authentication type, Bluetooth, VPN - Added Remote Access: RDP NLA, RDP port, Remote Assistance, WinRM - Added WSL Security: version, installed distros, network mode - Added Application Security: Edge SmartScreen, Enhanced Security Mode, browser/Adobe/Java versions - Added Authentication Policy: autologon, cached credentials, lockout threshold, password policy - Added System Hardening: driver signing, vulnerable drivers, hosts file tampering, password history - Added Scheduled Tasks: non-Microsoft tasks, SYSTEM-running tasks, suspicious paths - Added JSON export (-ExportJson), CSV export (-ExportCsv) - GitHub Actions CI workflow included - Graceful degradation on all new checks for Windows 10 and non-admin sessions v0.3.0 - Extended Defender analysis: Application Guard, scan age, sample submission - Exploit protection baseline checks v0.2.0 - Hardware security: TPM, Secure Boot, VBS, HVCI, Credential Guard, Kernel DMA - BitLocker per-drive with protector type - Windows 11 features: Smart App Control, Windows Hello, Windows Recall - PowerShell security: execution policy, script block logging, module logging, language mode - Live progress bar and risk score - Run-Analysis.bat launcher with auto-elevation v0.1.0 - Initial release: 8 core categories (network, services, firewall, shares, features, startup, users, system) '@ # Prerelease string for this version (e.g. 'preview', 'rc1') Prerelease = 'rc1' # Flag to indicate whether the module requires explicit user acceptance for install/update RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } } # HelpInfo URI of this module HelpInfoUri = 'https://github.com/NubleX/Windows-Attack-Surface-Analyzer/blob/main/README.md' } |