From ee5954b250a0357acf8708396d1e118e16183de2 Mon Sep 17 00:00:00 2001 From: WindowsAddict Date: Sat, 13 Apr 2024 02:19:28 +0530 Subject: replace .txt with .ps1 code files and add small_logo --- static/ias.ps1 | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 static/ias.ps1 (limited to 'static/ias.ps1') diff --git a/static/ias.ps1 b/static/ias.ps1 new file mode 100644 index 0000000..2c54bea --- /dev/null +++ b/static/ias.ps1 @@ -0,0 +1,29 @@ +# Check the instructions here on how to use it https://massgrave.dev/idm-activation-script + +$ErrorActionPreference = "Stop" +# Enable TLSv1.2 for compatibility with older clients +[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12 + +$DownloadURL = 'https://raw.githubusercontent.com/WindowsAddict/IDM-Activation-Script/main/IAS.cmd' +$DownloadURL2 = 'https://bitbucket.org/WindowsAddict/idm-activation-script/raw/main/IAS.cmd' + +$rand = Get-Random -Maximum 99999999 +$isAdmin = [bool]([Security.Principal.WindowsIdentity]::GetCurrent().Groups -match 'S-1-5-32-544') +$FilePath = if ($isAdmin) { "$env:SystemRoot\Temp\IAS_$rand.cmd" } else { "$env:TEMP\IAS_$rand.cmd" } + +try { + $response = Invoke-WebRequest -Uri $DownloadURL -UseBasicParsing +} +catch { + $response = Invoke-WebRequest -Uri $DownloadURL2 -UseBasicParsing +} + +$ScriptArgs = "$args " +$prefix = "@REM $rand `r`n" +$content = $prefix + $response +Set-Content -Path $FilePath -Value $content + +Start-Process $FilePath $ScriptArgs -Wait + +$FilePaths = @("$env:TEMP\IAS*.cmd", "$env:SystemRoot\Temp\IAS*.cmd") +foreach ($FilePath in $FilePaths) { Get-Item $FilePath | Remove-Item } -- cgit v1.2.3