Commit graph

11 commits

Author SHA1 Message Date
Nexus
d4dfe39e4f chore: bump version to 2.2.4, update CHANGELOG and README
Some checks failed
CI - PowerShell Quality Checks / PSScriptAnalyzer (push) Has been cancelled
CI - PowerShell Quality Checks / Test on PowerShell 5.1 (push) Has been cancelled
CI - PowerShell Quality Checks / Test on PowerShell 7.4 (push) Has been cancelled
CI - PowerShell Quality Checks / Validate Project Structure (push) Has been cancelled
Pester Tests / test (push) Has been cancelled
Version bump across 62 files (2.2.3 → 2.2.4).
CHANGELOG.md: New [2.2.4] section with EDR/XDR detection and version tooling.
README.md: Updated release highlights, AV detection example output synced with code.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-24 20:22:12 +01:00
Nexus
10af4b34bd chore: add VERSION file and Bump-Version.ps1 script
Single source of truth for version numbers. Bump-Version.ps1 replaces
the old version across all 61 files (113 occurrences) automatically.
CHANGELOG.md is excluded to preserve historical entries.

Usage:
  .\Tools\Bump-Version.ps1 -NewVersion "2.2.4" -DryRun  # preview
  .\Tools\Bump-Version.ps1 -NewVersion "2.2.4"           # apply

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-24 20:10:42 +01:00
Nexus
6192753a7a feat: detect EDR/XDR and third-party AV in passive mode (#15)
CrowdStrike Falcon and other EDR/XDR products don't register in WMI
SecurityCenter2, but put Defender in Passive Mode. This caused ASR
rules to either silently fail or throw errors.

New 3-layer detection:
- Layer 1: WMI SecurityCenter2 (traditional AV: Bitdefender, Kaspersky, etc.)
- Layer 2: Defender Passive Mode via Get-MpComputerStatus (EDR/XDR)
- Layer 3: 18 known EDR service names for display identification

Changes:
- Utils/Dependencies.ps1: New Test-ThirdPartySecurityProduct function,
  updated Test-WindowsDefenderAvailable with IsPassiveMode property,
  updated Test-AllDependencies to handle passive mode gracefully
- Modules/ASR/Public/Invoke-ASRRules.ps1: Detection runs before
  Defender service check, inline fallback for standalone execution
- Tools/Verify-Complete-Hardening.ps1: Same 3-layer detection, ASR
  counted as 19/19 verified when third-party product detected

Closes #15

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-23 20:41:38 +01:00
NexusOne23
da9f937ee8 release: v2.2.3 - Fix Restore Mode module selection crash
CHANGELOG:
- Fixed: Restore Mode manual module selection crash (Critical)
- Root cause: .Split(',', ';', ' ') triggered wrong .NET overload
- Fix: Replaced with native PowerShell -split '[,; ]' operator
- Reported by: KatCat2

VERSION BUMP: 2.2.2 -> 2.2.3
- Updated 48 files with new version number
- CHANGELOG.md: Added v2.2.3 release notes
- README.md: Updated badge, module table, project status
2026-01-07 18:46:14 +01:00
NexusOne23
4c1af02ad9 Security hardening: PATH hijack fix, SHA256 checksums, connectivity endpoint
- Start-NoIDPrivacy.bat: Use absolute System32 path for powershell.exe
- Core/Validator.ps1: Replace 8.8.8.8 with www.msftconnecttest.com
- Tools/Generate-ReleaseChecksums.ps1: New script for release checksums
- SECURITY.md: Updated verification instructions
2025-12-22 23:17:22 +01:00
NexusOne23
79eb810096 fix: HTML report shows all 633 settings + improved print layout 2025-12-22 22:38:14 +01:00
NexusOne23
877e01df37 v2.2.2: Performance fix for firewall snapshot (60-120s to 2-5s) + version alignment 2025-12-22 06:46:53 +01:00
NexusOne23
b3efcf35fd v2.2.1: Critical multi-run session bugfix, .Count property fix, ASR prompt improvement, code quality review 2025-12-20 23:08:01 +01:00
NexusOne23
d78d941113 v2.2.0: Fix Privacy settings count + DoH connectivity test
Privacy Module:
- Fixed 'Applied X settings' to show only registry settings (60/78/86)
- Bloatware count no longer added to settings total
- Consistent with module prompt (MSRecommended: 60, Strict: 78, Paranoid: 86)

DNS Module:
- Fixed DoH connectivity test for systems with REQUIRE mode active
- Tests HTTPS endpoint (port 443) when classic DNS is blocked
- Proper detection of existing DoH configuration

Verified: Full Apply/Verify/Restore cycle - 633/633 settings (100%)
2025-12-09 10:48:12 +01:00
NexusOne23
cd4d7188fc Fix: Framework AntiAI 15 features, Privacy counts, Edge 24 policies, config.json 2025-12-09 07:03:39 +01:00
NexusOne23
ba364813ed v2.2.0 - Complete Security Hardening Framework (632 Settings) 2025-12-08 10:32:49 +01:00