diff --git a/LICENSE b/LICENSE new file mode 100644 index 0000000..c62de7f --- /dev/null +++ b/LICENSE @@ -0,0 +1,21 @@ +MIT License + +Copyright (c) 2020 nneeoo + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. \ No newline at end of file diff --git a/Readme.md b/Readme.md index 97d2d22..e596672 100644 --- a/Readme.md +++ b/Readme.md @@ -24,18 +24,17 @@ $env:ProgramFiles\PowerShell\7\Modules * The minimum Windows Management Framework (PowerShell) version required is 5.1 or higher. -* Target machine must be running Windows Server 2012 R2 or later. +* Target machine must be running Windows Server 2016 or later. ## List of commands and examples The following is a list of commands which are available for you to use once you follow the steps in Installation | Command |Description| |----------------------------------------------------------|-----------| -| [Stop-Bruteforce](/Stop-Bruteforce.md) |Read Windows Event Log, search for Audit Failure. Adds ip adresses of attackers to deny firewall rule.| -| [Get-Bruteforce](/Get-Bruteforce.md) |Read Windows Event Log, search for Audit Failure and Audit success anonimous logon events. Return array of BruteStatistics.| -| [Protect-FromBruteforce](/Protect-FromBruteforce.md) |Read Windows Event Log, search for Audit Seccess. Add ip adresses of non anonimous users to default firewall rules.| -| [Unprotect-FromBruteforce](/Unprotect-FromBruteforce.md) |Reset remote scope of default firewall rules for SMB, WinRM or RDP back to ANY.| - +| [Stop-Bruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Stop-Bruteforce) |Read Windows Event Log, search for Audit Failure. Adds ip adresses of attackers to deny firewall rule.| +| [Get-Bruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Get-Bruteforce) |Read Windows Event Log, search for Audit Failure and Audit success anonimous logon events. Return array of BruteStatistics.| +| [Protect-FromBruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Protect-FromBruteforce) |Read Windows Event Log, search for Audit Seccess. Add ip adresses of non anonimous users to default firewall rules.| +| [Unprotect-FromBruteforce](https://github.com/nneeoo/PSStopBruteforce/wiki/Unprotect-FromBruteforce) |Reset remote scope of default firewall rules for SMB, WinRM or RDP back to ANY.| ## Change log