* Cantinho Satkeys

Refresh History
  • Manuel Cordeiro: explorador
    21 de Julho de 2025, 18:06
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    21 de Julho de 2025, 11:09
  • j.s.: resolvida a situação, da qual fomos alheios, estamos novamente online  49E09B4F
    20 de Julho de 2025, 15:18
  • j.s.: devido a problemas no servidor externo, o forum esteve offline algum tempo
    20 de Julho de 2025, 15:16
  • j.s.: dgtgtr a todos  4tj97u<z
    20 de Julho de 2025, 15:15
  • cereal killa: dgtgtr e bom fim semana  r4v8p  535reqef34
    19 de Julho de 2025, 20:03
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    19 de Julho de 2025, 11:44
  • xifanwaifan11: ja
    18 de Julho de 2025, 11:44
  • JPratas: try65hytr A Todos  4tj97u<z classic k7y8j0
    18 de Julho de 2025, 05:11
  • cunha45: Entendido
    16 de Julho de 2025, 20:33
  • j.s.: reafirmo 15/07/2026 o forum encerra
    16 de Julho de 2025, 18:26
  • j.s.: o que foi dito é que este ano está pago, e para bom entendedor foi dito que após desinteresse nos membros, ficam já avisados que a 15/07/2026
    16 de Julho de 2025, 18:25
  • j.s.: boa tarde
    16 de Julho de 2025, 18:22
  • cunha45: Com a colaboração de 6 membros, aos quais agradecemos e com custos muito elevados, por parte da administração, foi pago mais um ano , do domínio e nome do fórum, num servidor externo.  Como o fórum é dos dos seus membros, e como estes mostraram total desinteresse numa pequena ajuda para a sua manutenção informamos que  a partir de 15/07/2026 o fórum encerra as suas portas.  Para todos os membros que não nos quiseram ajudar, e que fazem neste fórum, os seus downloads do que aqui disponibilizamos, para seu proveito e de borla, iremos cancelar essa função, apenas podendo vizualizar o forum.  A administação
    16 de Julho de 2025, 13:43
  • cunha45: ainda nao encerrou
    16 de Julho de 2025, 13:42
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    16 de Julho de 2025, 11:46
  • m1957: Obrigado pelo cuidado em informar!
    16 de Julho de 2025, 00:45
  • cereal killa: boas gomes, 4tj97u<z
    14 de Julho de 2025, 21:32
  • j.s.: cereal enviei pm  4tj97u<z
    14 de Julho de 2025, 21:13
  • j.s.: Entre as 20h do dia 13 de agosto de 2025 e as 10h do dia 14 de agosto de 2025 (horário CEST).
    14 de Julho de 2025, 20:55

Autor Tópico: Hardentools 2.4  (Lida 64 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Offline mitsumi

  • Sub-Administrador
  • ****
  • Mensagens: 121842
  • Karma: +0/-0
Hardentools 2.4
« em: 01 de Janeiro de 2023, 04:19 »


File Size : 8.4 Mb

Hardentools is a collection of simple utilities designed to disable a number of "features" exposed by operating systems (Microsoft Windows, for now), and primary consumer applications. These features, commonly thought for Enterprise customers, are generally useless to regular users and rather pose as dangers as they are very commonly abused by attackers to execute malicious code on a victim's computer. The intent of this tool is to simply reduce the attack surface by disabling the low-hanging fruit. Hardentools is intended for individuals at risk, who might want an extra level of security at the price of some usability. It is not intended for corporate environments.

Disabled Features
Generic Windows Features
Disable Windows Script Host. Windows Script Host allows the execution of VBScript and Javascript files on Windows operating systems. This is very commonly used by regular malware (such as ransomware) as well as targeted malware.
Disabling AutoRun and AutoPlay. Disables AutoRun / AutoPlay for all devices. For example, this should prevent applications from automatically executing when you plug a USB stick into your computer.
Disables powershell.exe, powershell_ise.exe, and cmd.exe execution via Windows Explorer. You will not be able to use the terminal, and it should prevent the use of PowerShell by malicious code trying to infect the system.
Sets User Account Control (UAC) to always ask for permission (even on configuration changes only) and to use "secure desktop."
Disable file extensions mainly used for malicious purposes. Disables the ".hta", ".js", ".JSE", ".WSH",."WSF", ".scf", ".scr", ".vbs", ".vbe" and ".pif" file extensions for the current user (and for system-wide defaults, which is only relevant for newly created users).
Shows file extensions and hidden files in explorer.
Windows Defender Attack Surface Reduction (ASR). Enables various remediations using ASR starting with Windows 10 / 1709 (Block executable content from email client and webmail, Block Office applications from creating child processes, Block Office applications from creating executable content & from injecting code into other processes, Block JavaScript or VBScript from launching downloaded executable content, Block execution of potentially obfuscated scripts, Block Win32 API calls from Office macro). Needs the following prerequisites to work: (1) Windows 10 version >= 1709, (2) You are using Windows Defender Antivirus as the sole antivirus protection app. (3) Real-time protection is enabled in Windows Defender.
Microsoft Office
Disable Macros. Macros are at times used by Microsoft Office users to script and automate certain activities, especially calculations with Microsoft Excel. However, macros are currently a security plague, and they are widely used as a vehicle for compromise. With Hardentools, macros are disabled, and the "Enable this Content" notification is disabled, too, to prevent users from being tricked.
Disable OLE object execution. Microsoft Office applications can embed so-called "OLE objects" and execute them, at times also automatically (for example, through PowerPoint animations). Windows executables, such as spyware, can also be embedded and executed as an object. This is also a security disaster that we observed used time and time again, particularly in attacks against activists in repressed regions. Hardentools entirely disables this functionality.
Disabling ActiveX. Disables ActiveX Controls for all Office applications.
Disable DDE. Disables DDE for Word and Excel
Acrobat Reader
Disable JavaScript in PDF documents. Acrobat Reader allows executing JavaScript code from within PDF documents. This is widely abused for exploitation and malicious activity.
Disable execution of objects embedded in PDF documents. Acrobat Reader also allows the execution of embedded objects by opening them. This would normally raise a security alert, but given that legitimate uses of this are rare and limited, Hardentools disables this.
Switch on the Protected Mode (enabled by default in current versions)
Switch on Protected View for all files from untrusted sources
Switch on Enhanced Security (enabled by default in current versions)
WARNING: This tool disables a number of features, including of Microsoft Office, Adobe Reader, and Windows, that might cause malfunctions to certain applications. Use this at your own risk.
Código: [Seleccione]
https://github.com/securitywithoutborders/hardentools/releases/
Homepage:
Código: [Seleccione]
https://www.securitywithoutborders.org/
Download link

rapidgator.net:
Citar
https://rapidgator.net/file/07d0e7278d4db76676d5e5736333c175/ahvih.Hardentools.2.4.rar.html

uploadgig.com:
Citar
https://uploadgig.com/file/download/b9529cbeFee82856/ahvih.Hardentools.2.4.rar

nitroflare.com:
Citar
https://nitroflare.com/view/6291E4EC494DD6C/ahvih.Hardentools.2.4.rar

1dl.net:
Citar
https://1dl.net/5b3piq4e606m/ahvih.Hardentools.2.4.rar