mirror of
https://github.com/NexusOne23/noid-privacy.git
synced 2026-02-26 21:24:18 +01:00
release: v2.2.3 - Fix Restore Mode module selection crash
CHANGELOG:
- Fixed: Restore Mode manual module selection crash (Critical)
- Root cause: .Split(',', ';', ' ') triggered wrong .NET overload
- Fix: Replaced with native PowerShell -split '[,; ]' operator
- Reported by: KatCat2
VERSION BUMP: 2.2.2 -> 2.2.3
- Updated 48 files with new version number
- CHANGELOG.md: Added v2.2.3 release notes
- README.md: Updated badge, module table, project status
This commit is contained in:
parent
8435dbe97b
commit
da9f937ee8
48 changed files with 628 additions and 589 deletions
|
|
@ -1,31 +1,31 @@
|
|||
@{
|
||||
RootModule = 'ASR.psm1'
|
||||
ModuleVersion = '2.2.2'
|
||||
GUID = 'b2c3d4e5-f6a7-8901-bcde-f23456789012'
|
||||
Author = 'NexusOne23'
|
||||
CompanyName = 'Open Source Project'
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
Description = 'Attack Surface Reduction (ASR) - All 19 Microsoft Defender ASR rules in Block mode for maximum protection against modern threats'
|
||||
RootModule = 'ASR.psm1'
|
||||
ModuleVersion = '2.2.3'
|
||||
GUID = 'b2c3d4e5-f6a7-8901-bcde-f23456789012'
|
||||
Author = 'NexusOne23'
|
||||
CompanyName = 'Open Source Project'
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
Description = 'Attack Surface Reduction (ASR) - All 19 Microsoft Defender ASR rules in Block mode for maximum protection against modern threats'
|
||||
|
||||
PowerShellVersion = '5.1'
|
||||
|
||||
RequiredModules = @()
|
||||
RequiredModules = @()
|
||||
|
||||
FunctionsToExport = @(
|
||||
'Invoke-ASRRules'
|
||||
)
|
||||
|
||||
CmdletsToExport = @()
|
||||
CmdletsToExport = @()
|
||||
VariablesToExport = @()
|
||||
AliasesToExport = @()
|
||||
AliasesToExport = @()
|
||||
|
||||
PrivateData = @{
|
||||
PrivateData = @{
|
||||
PSData = @{
|
||||
Tags = @('Security', 'ASR', 'AttackSurfaceReduction', 'Defender', 'Windows11', 'Ransomware')
|
||||
LicenseUri = ''
|
||||
ProjectUri = ''
|
||||
Tags = @('Security', 'ASR', 'AttackSurfaceReduction', 'Defender', 'Windows11', 'Ransomware')
|
||||
LicenseUri = ''
|
||||
ProjectUri = ''
|
||||
ReleaseNotes = @"
|
||||
v2.2.2 - Production Release
|
||||
v2.2.3 - Production Release
|
||||
- All 19 ASR rules implementation
|
||||
- Hybrid approach: Registry backup + Set-MpPreference application
|
||||
- SCCM/Configuration Manager detection
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@
|
|||
|
||||
.NOTES
|
||||
Author: NexusOne23
|
||||
Version: 2.2.2
|
||||
Version: 2.2.3
|
||||
Requires: PowerShell 5.1+, Administrator privileges, Windows Defender
|
||||
#>
|
||||
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
# Module manifest for AdvancedSecurity
|
||||
|
||||
# Version
|
||||
ModuleVersion = '2.2.2'
|
||||
ModuleVersion = '2.2.3'
|
||||
|
||||
# Unique ID
|
||||
GUID = 'e7f5a3d2-8c9b-4f1e-a6d3-9b2c8f4e5a1d'
|
||||
|
|
@ -48,7 +48,7 @@
|
|||
LicenseUri = ''
|
||||
ProjectUri = ''
|
||||
ReleaseNotes = @'
|
||||
v2.2.2 (2025-12-08)
|
||||
v2.2.3 (2025-12-08)
|
||||
- Production release of AdvancedSecurity module
|
||||
- 49 advanced hardening settings implemented (was 36)
|
||||
- NEW: Wireless Display (Miracast) security hardening
|
||||
|
|
|
|||
|
|
@ -1,5 +1,5 @@
|
|||
# AdvancedSecurity Module Loader
|
||||
# Version: 2.2.2
|
||||
# Version: 2.2.3
|
||||
# Description: Advanced Security Hardening - Beyond Microsoft Security Baseline
|
||||
|
||||
# Get module path
|
||||
|
|
|
|||
|
|
@ -1,21 +1,21 @@
|
|||
@{
|
||||
RootModule = 'AntiAI.psm1'
|
||||
ModuleVersion = '2.2.2'
|
||||
GUID = 'f8e9d7c6-5b4a-3c2d-1e0f-9a8b7c6d5e4f'
|
||||
Author = 'NexusOne23'
|
||||
CompanyName = 'Open Source Project'
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
Description = 'Comprehensive Windows 11 AI deactivation - Disables all 15 AI features using official Microsoft policies (Recall, Copilot, Paint AI, Notepad AI, Click to Do, Settings Agent, etc.). Maximum compliance mode with enterprise-grade Recall protection.'
|
||||
RootModule = 'AntiAI.psm1'
|
||||
ModuleVersion = '2.2.3'
|
||||
GUID = 'f8e9d7c6-5b4a-3c2d-1e0f-9a8b7c6d5e4f'
|
||||
Author = 'NexusOne23'
|
||||
CompanyName = 'Open Source Project'
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
Description = 'Comprehensive Windows 11 AI deactivation - Disables all 15 AI features using official Microsoft policies (Recall, Copilot, Paint AI, Notepad AI, Click to Do, Settings Agent, etc.). Maximum compliance mode with enterprise-grade Recall protection.'
|
||||
PowerShellVersion = '5.1'
|
||||
|
||||
FunctionsToExport = @(
|
||||
'Invoke-AntiAI'
|
||||
)
|
||||
|
||||
PrivateData = @{
|
||||
PrivateData = @{
|
||||
PSData = @{
|
||||
Tags = @('Windows11', 'AI', 'Privacy', 'Security', 'Recall', 'Copilot', 'AntiAI')
|
||||
ProjectUri = 'https://github.com/yourusername/NoIDPrivacy'
|
||||
Tags = @('Windows11', 'AI', 'Privacy', 'Security', 'Recall', 'Copilot', 'AntiAI')
|
||||
ProjectUri = 'https://github.com/yourusername/NoIDPrivacy'
|
||||
ReleaseNotes = @'
|
||||
v1.0.0 - Initial Release
|
||||
- Disables 8+ Windows 11 AI features using official Microsoft policies
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@
|
|||
|
||||
.NOTES
|
||||
Module: AntiAI
|
||||
Version: 2.2.2
|
||||
Version: 2.2.3
|
||||
Author: NoID Privacy
|
||||
#>
|
||||
|
||||
|
|
@ -27,7 +27,7 @@ $privateFunctions = @(
|
|||
'Disable-Recall'
|
||||
'Set-RecallProtection'
|
||||
'Disable-Copilot'
|
||||
'Disable-CopilotAdvanced' # NEW v2.2.2: URI handlers, Edge sidebar, Recall export
|
||||
'Disable-CopilotAdvanced' # NEW v2.2.3: URI handlers, Edge sidebar, Recall export
|
||||
'Disable-ClickToDo'
|
||||
'Disable-SettingsAgent'
|
||||
'Disable-ExplorerAI' # NEW: File Explorer AI Actions menu
|
||||
|
|
|
|||
|
|
@ -52,7 +52,7 @@
|
|||
|
||||
.NOTES
|
||||
Author: NoID Privacy
|
||||
Version: 2.2.2
|
||||
Version: 2.2.3
|
||||
Requires: Windows 11 24H2 or later, Administrator privileges
|
||||
Impact: All AI features completely disabled, reboot required
|
||||
#>
|
||||
|
|
@ -70,7 +70,7 @@ function Invoke-AntiAI {
|
|||
|
||||
Write-Host "" -ForegroundColor Cyan
|
||||
Write-Host "========================================" -ForegroundColor Cyan
|
||||
Write-Host " ANTI-AI MODULE v2.2.2" -ForegroundColor Cyan
|
||||
Write-Host " ANTI-AI MODULE v2.2.3" -ForegroundColor Cyan
|
||||
Write-Host "========================================" -ForegroundColor Cyan
|
||||
Write-Host ""
|
||||
Write-Host "Disables 15 AI features (32 policies):" -ForegroundColor White
|
||||
|
|
@ -171,7 +171,7 @@ function Invoke-AntiAI {
|
|||
@{ Path = "HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Paint"; Name = "DisableImageCreator"; Type = "DWord" },
|
||||
@{ Path = "HKLM:\SOFTWARE\Policies\WindowsNotepad"; Name = "DisableAIFeatures"; Type = "DWord" },
|
||||
@{ Path = "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsAI"; Name = "DisableSettingsAgent"; Type = "DWord" },
|
||||
# NEW v2.2.2: Advanced Copilot Blocking
|
||||
# NEW v2.2.3: Advanced Copilot Blocking
|
||||
@{ Path = "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsAI"; Name = "AllowRecallExport"; Type = "DWord" },
|
||||
@{ Path = "HKLM:\SOFTWARE\Policies\Microsoft\Edge"; Name = "EdgeSidebarEnabled"; Type = "DWord" },
|
||||
@{ Path = "HKLM:\SOFTWARE\Policies\Microsoft\Edge"; Name = "ShowHubsSidebar"; Type = "DWord" },
|
||||
|
|
@ -196,7 +196,7 @@ function Invoke-AntiAI {
|
|||
$prop = Get-ItemProperty -Path $t.Path -Name $t.Name -ErrorAction SilentlyContinue
|
||||
if ($null -ne $prop -and $prop.PSObject.Properties.Name -contains $t.Name) {
|
||||
$entry.Exists = $true
|
||||
$entry.Value = $prop.$($t.Name)
|
||||
$entry.Value = $prop.$($t.Name)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
@ -272,7 +272,8 @@ function Invoke-AntiAI {
|
|||
Register-Backup -Type "AntiAI" -Data $expJson -Name "Explorer_Advanced_Device_JSON" | Out-Null
|
||||
}
|
||||
}
|
||||
} catch {
|
||||
}
|
||||
catch {
|
||||
Write-Host " WARNING: Failed to create JSON backup for Explorer Advanced: $_" -ForegroundColor Yellow
|
||||
}
|
||||
}
|
||||
|
|
@ -355,7 +356,7 @@ function Invoke-AntiAI {
|
|||
}
|
||||
|
||||
# ============================================================================
|
||||
# ADVANCED COPILOT BLOCKING (NEW v2.2.2)
|
||||
# ADVANCED COPILOT BLOCKING (NEW v2.2.3)
|
||||
# ============================================================================
|
||||
Write-Host ""
|
||||
Write-Host " [Advanced Copilot Blocks]" -ForegroundColor Cyan
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
# Module manifest for DNS module
|
||||
|
||||
RootModule = 'DNS.psm1'
|
||||
ModuleVersion = '2.2.2'
|
||||
ModuleVersion = '2.2.3'
|
||||
GUID = 'a8f7b3c9-4e5d-4a2b-9c1d-8f3e5a7b9c2d'
|
||||
Author = 'NexusOne23'
|
||||
CompanyName = 'Open Source Project'
|
||||
|
|
|
|||
|
|
@ -12,7 +12,7 @@
|
|||
|
||||
.NOTES
|
||||
Author: NoID Privacy
|
||||
Version: 2.2.2
|
||||
Version: 2.2.3
|
||||
Requires: PowerShell 5.1+, Administrator privileges
|
||||
#>
|
||||
|
||||
|
|
|
|||
|
|
@ -1,30 +1,30 @@
|
|||
@{
|
||||
# Script module or binary module file associated with this manifest
|
||||
RootModule = 'EdgeHardening.psm1'
|
||||
RootModule = 'EdgeHardening.psm1'
|
||||
|
||||
# Version number of this module
|
||||
ModuleVersion = '2.2.2'
|
||||
ModuleVersion = '2.2.3'
|
||||
|
||||
# ID used to uniquely identify this module
|
||||
GUID = '8e3f4c2a-9b1d-4e7a-a2c5-6f8b3d9e1a4c'
|
||||
GUID = '8e3f4c2a-9b1d-4e7a-a2c5-6f8b3d9e1a4c'
|
||||
|
||||
# Author of this module
|
||||
Author = 'NexusOne23'
|
||||
Author = 'NexusOne23'
|
||||
|
||||
# Company or vendor of this module
|
||||
CompanyName = 'Open Source Project'
|
||||
CompanyName = 'Open Source Project'
|
||||
|
||||
# Copyright statement for this module
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
|
||||
# Description of the functionality provided by this module
|
||||
Description = 'Microsoft Edge Security Hardening based on MS Edge v139 Security Baseline. Applies 24 security policies to harden Microsoft Edge browser using native PowerShell (no LGPO.exe dependency). Includes SmartScreen enforcement, site isolation, SSL/TLS hardening, extension blocking, and IE mode restrictions.'
|
||||
Description = 'Microsoft Edge Security Hardening based on MS Edge v139 Security Baseline. Applies 24 security policies to harden Microsoft Edge browser using native PowerShell (no LGPO.exe dependency). Includes SmartScreen enforcement, site isolation, SSL/TLS hardening, extension blocking, and IE mode restrictions.'
|
||||
|
||||
# Minimum version of the PowerShell engine required by this module
|
||||
PowerShellVersion = '5.1'
|
||||
|
||||
# Modules that must be imported into the global environment prior to importing this module
|
||||
RequiredModules = @()
|
||||
RequiredModules = @()
|
||||
|
||||
# Functions to export from this module
|
||||
FunctionsToExport = @(
|
||||
|
|
@ -33,22 +33,22 @@
|
|||
)
|
||||
|
||||
# Cmdlets to export from this module
|
||||
CmdletsToExport = @()
|
||||
CmdletsToExport = @()
|
||||
|
||||
# Variables to export from this module
|
||||
VariablesToExport = @()
|
||||
|
||||
# Aliases to export from this module
|
||||
AliasesToExport = @()
|
||||
AliasesToExport = @()
|
||||
|
||||
# Private data to pass to the module specified in RootModule/ModuleToProcess
|
||||
PrivateData = @{
|
||||
PrivateData = @{
|
||||
PSData = @{
|
||||
Tags = @('Security', 'Edge', 'Browser', 'Hardening', 'Baseline', 'Windows11', 'Privacy')
|
||||
LicenseUri = ''
|
||||
ProjectUri = ''
|
||||
Tags = @('Security', 'Edge', 'Browser', 'Hardening', 'Baseline', 'Windows11', 'Privacy')
|
||||
LicenseUri = ''
|
||||
ProjectUri = ''
|
||||
ReleaseNotes = @"
|
||||
v2.2.2 - Production Release
|
||||
v2.2.3 - Production Release
|
||||
- Microsoft Edge v139 Security Baseline implementation
|
||||
- 20 security policies (native PowerShell, no LGPO.exe)
|
||||
- SmartScreen enforcement with override prevention
|
||||
|
|
|
|||
|
|
@ -16,7 +16,7 @@
|
|||
|
||||
.NOTES
|
||||
Author: NexusOne23
|
||||
Version: 2.2.2
|
||||
Version: 2.2.3
|
||||
Requires: PowerShell 5.1+, Administrator privileges
|
||||
#>
|
||||
|
||||
|
|
|
|||
|
|
@ -48,7 +48,7 @@
|
|||
|
||||
.NOTES
|
||||
Author: NexusOne23
|
||||
Version: 2.2.2
|
||||
Version: 2.2.3
|
||||
Requires: PowerShell 5.1+, Administrator privileges
|
||||
|
||||
IMPORTANT: This applies Microsoft's recommended security baseline.
|
||||
|
|
|
|||
|
|
@ -23,7 +23,7 @@
|
|||
|
||||
.NOTES
|
||||
Author: NexusOne23
|
||||
Version: 2.2.2
|
||||
Version: 2.2.3
|
||||
Can be run without Administrator privileges
|
||||
#>
|
||||
|
||||
|
|
@ -103,8 +103,8 @@ function Test-EdgeHardening {
|
|||
|
||||
return [PSCustomObject]@{
|
||||
Compliant = $false
|
||||
Message = "Test failed: $($_.Exception.Message)"
|
||||
Details = @()
|
||||
Message = "Test failed: $($_.Exception.Message)"
|
||||
Details = @()
|
||||
}
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,11 +1,11 @@
|
|||
@{
|
||||
RootModule = 'Privacy.psm1'
|
||||
ModuleVersion = '2.2.2'
|
||||
GUID = 'a9f7c8d3-2e5b-4a1f-9c3d-7e8f5a6b2c4d'
|
||||
Author = 'NexusOne23'
|
||||
CompanyName = 'Open Source Project'
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
Description = 'Privacy & Telemetry hardening module with Bloatware removal and OneDrive configuration. Supports 3 modes: MSRecommended (default), Strict (maximum privacy, apps still work), and Paranoid (hardcore).'
|
||||
RootModule = 'Privacy.psm1'
|
||||
ModuleVersion = '2.2.3'
|
||||
GUID = 'a9f7c8d3-2e5b-4a1f-9c3d-7e8f5a6b2c4d'
|
||||
Author = 'NexusOne23'
|
||||
CompanyName = 'Open Source Project'
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
Description = 'Privacy & Telemetry hardening module with Bloatware removal and OneDrive configuration. Supports 3 modes: MSRecommended (default), Strict (maximum privacy, apps still work), and Paranoid (hardcore).'
|
||||
|
||||
PowerShellVersion = '5.1'
|
||||
|
||||
|
|
@ -15,15 +15,15 @@
|
|||
'Test-PrivacyCompliance'
|
||||
)
|
||||
|
||||
CmdletsToExport = @()
|
||||
CmdletsToExport = @()
|
||||
VariablesToExport = @()
|
||||
AliasesToExport = @()
|
||||
AliasesToExport = @()
|
||||
|
||||
PrivateData = @{
|
||||
PrivateData = @{
|
||||
PSData = @{
|
||||
Tags = @('Privacy', 'Telemetry', 'Bloatware', 'OneDrive', 'Windows11', 'Security')
|
||||
LicenseUri = 'https://github.com/yourusername/NoIDPrivacyPro/blob/main/LICENSE'
|
||||
ProjectUri = 'https://github.com/yourusername/NoIDPrivacyPro'
|
||||
Tags = @('Privacy', 'Telemetry', 'Bloatware', 'OneDrive', 'Windows11', 'Security')
|
||||
LicenseUri = 'https://github.com/yourusername/NoIDPrivacyPro/blob/main/LICENSE'
|
||||
ProjectUri = 'https://github.com/yourusername/NoIDPrivacyPro'
|
||||
ReleaseNotes = 'Initial release - Privacy module with 3-mode support'
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -16,7 +16,7 @@
|
|||
|
||||
.NOTES
|
||||
Module: Privacy
|
||||
Version: 2.2.2
|
||||
Version: 2.2.3
|
||||
Author: NoID Privacy
|
||||
#>
|
||||
|
||||
|
|
|
|||
|
|
@ -44,7 +44,7 @@
|
|||
|
||||
.NOTES
|
||||
Author: NexusOne23
|
||||
Version: 2.2.2 - Self-Contained Edition
|
||||
Version: 2.2.3 - Self-Contained Edition
|
||||
Requires: PowerShell 5.1+, Administrator privileges
|
||||
|
||||
BREAKING CHANGE from v1.0:
|
||||
|
|
|
|||
|
|
@ -1,32 +1,32 @@
|
|||
@{
|
||||
RootModule = 'SecurityBaseline.psm1'
|
||||
ModuleVersion = '2.2.2'
|
||||
GUID = 'a1b2c3d4-e5f6-7890-abcd-ef1234567890'
|
||||
Author = 'NexusOne23'
|
||||
CompanyName = 'Open Source Project'
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
Description = 'Microsoft Security Baseline for Windows 11 25H2 - 425 hardening settings implementing enterprise-grade security standards. Self-contained, no LGPO.exe required. (437 entries parsed, 12 are INF metadata)'
|
||||
RootModule = 'SecurityBaseline.psm1'
|
||||
ModuleVersion = '2.2.3'
|
||||
GUID = 'a1b2c3d4-e5f6-7890-abcd-ef1234567890'
|
||||
Author = 'NexusOne23'
|
||||
CompanyName = 'Open Source Project'
|
||||
Copyright = '(c) 2025 NexusOne23. Licensed under GPL-3.0.'
|
||||
Description = 'Microsoft Security Baseline for Windows 11 25H2 - 425 hardening settings implementing enterprise-grade security standards. Self-contained, no LGPO.exe required. (437 entries parsed, 12 are INF metadata)'
|
||||
|
||||
PowerShellVersion = '5.1'
|
||||
|
||||
RequiredModules = @()
|
||||
RequiredModules = @()
|
||||
|
||||
FunctionsToExport = @(
|
||||
'Invoke-SecurityBaseline',
|
||||
'Restore-SecurityBaseline'
|
||||
)
|
||||
|
||||
CmdletsToExport = @()
|
||||
CmdletsToExport = @()
|
||||
VariablesToExport = @()
|
||||
AliasesToExport = @()
|
||||
AliasesToExport = @()
|
||||
|
||||
PrivateData = @{
|
||||
PrivateData = @{
|
||||
PSData = @{
|
||||
Tags = @('Security', 'Hardening', 'Windows11', 'Baseline', 'Microsoft', 'Enterprise')
|
||||
LicenseUri = ''
|
||||
ProjectUri = ''
|
||||
Tags = @('Security', 'Hardening', 'Windows11', 'Baseline', 'Microsoft', 'Enterprise')
|
||||
LicenseUri = ''
|
||||
ProjectUri = ''
|
||||
ReleaseNotes = @"
|
||||
v2.2.2 - Self-Contained Edition
|
||||
v2.2.3 - Self-Contained Edition
|
||||
- NO LGPO.exe REQUIRED! Fully self-contained implementation
|
||||
- 425 Microsoft Security Baseline settings for Windows 11 25H2
|
||||
- 335 Registry policies (Computer + User)
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@
|
|||
|
||||
.NOTES
|
||||
Author: NexusOne23
|
||||
Version: 2.2.2
|
||||
Version: 2.2.3
|
||||
Requires: PowerShell 5.1+, Administrator privileges
|
||||
#>
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue