dargslan
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows Package Manager (winget) audit toolkit — installed apps, available updates, source configuration, and settings analysis |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows Features and Roles audit toolkit — installed features, available features, role services, and feature dependency analysis |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Attack Surface Reduction rules management toolkit — ASR rule inventory, action states, exclusions, block events, and compliance reporting |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows audit log configuration toolkit — event log sizes, retention policies, advanced audit policy, security event log health |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows clipboard and data transfer security toolkit — clipboard history, cloud clipboard, cross-device sync, and data leakage prevention |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
DCOM configuration audit toolkit — DCOM applications, launch permissions, access security, and attack surface assessment |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows device encryption audit toolkit — encryption status across all drives, recovery key backup, encryption method, and compliance status |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows Event Forwarding (WEF) audit toolkit — subscriptions, collector status, source computers, event delivery optimization |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
IPsec policy and SA management toolkit — main mode SAs, quick mode SAs, IPsec rules, connection security policies, and encryption analysis |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Kerberos authentication audit toolkit — ticket cache, SPN inventory, delegation analysis, and Kerberos policy validation |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
LSA Protection and LSASS hardening audit toolkit — RunAsPPL, credential dumping defense, memory protection, and security assessment |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows locale and language configuration audit toolkit — system locale, input methods, timezone, regional settings, and Unicode compliance |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Network Location Awareness audit toolkit — network profiles, connectivity status, firewall profile mapping, and network category management |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
NTFS filesystem security audit toolkit — permission inheritance, alternate data streams, junction points, hard links, and filesystem integrity |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows OS hardening assessment toolkit — CIS benchmark checks, STIG compliance, security baseline scoring, and hardening recommendations |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows power plan optimization toolkit — active plan analysis, custom plan detection, battery health, thermal monitoring, and energy efficiency scoring |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows proxy and internet settings audit toolkit — system proxy, PAC files, WinHTTP proxy, IE/Edge settings, and proxy bypass lists |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows security remediation toolkit — common hardening fixes, quick remediation actions, baseline enforcement, and compliance repair |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows token and privilege audit toolkit — current user privileges, token integrity, UAC bypass detection, and privilege escalation assessment |
|
By:
|
2 downloads
|
Last Updated: 4/14/2026
|
Latest Version: 2.0.0
Windows VPN configuration audit toolkit — VPN connections, protocols, authentication methods, split tunneling, and always-on VPN status |