Compare commits
36 Commits
86075abe20
...
main
Author | SHA1 | Date | |
---|---|---|---|
afd4741c01 | |||
05bc3d2d6c | |||
2c21ae10c6 | |||
ade8d861c8 | |||
d995bd263a | |||
f34d7c3821 | |||
8483ce8f0d | |||
a310ab0bc7 | |||
fde9ff93b3 | |||
e24fb6d139 | |||
5f3f716a3f | |||
2cb868073a | |||
ad431c887c | |||
cd30cb731b | |||
b18c4e213c | |||
3c1dae87b1 | |||
1b590c2404 | |||
eb37696ac4 | |||
9e8c4da697 | |||
5a5171395f | |||
37d99132ac | |||
72ca520b16 | |||
bd780a98d2 | |||
40d372b1b5 | |||
37c885bd76 | |||
633ff5b7e0 | |||
2172c5789b | |||
1c404f75fa | |||
5f3bab9f1c | |||
f281784336 | |||
843a05f4c7 | |||
f21e1f70ee | |||
47bec55293 | |||
81182013c0 | |||
bff5cebcc3 | |||
1baed6cf24 |
@ -1 +1,4 @@
|
|||||||
# get.ps1
|
https://get.activated.win
|
||||||
|
=================
|
||||||
|
|
||||||
|
This repository contains `irm https://get.activated.win | iex` loader script.
|
||||||
|
@ -1 +0,0 @@
|
|||||||
/* /get 200
|
|
35
get
35
get
@ -1,35 +0,0 @@
|
|||||||
# The following get.ps1 code is hosted on get.activated.win for massgrave.dev. For more info, please visit massgrave.dev.
|
|
||||||
|
|
||||||
$ErrorActionPreference = "Stop"
|
|
||||||
# Enable TLSv1.2 for compatibility with older clients for current session
|
|
||||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
|
||||||
|
|
||||||
$DownloadURL1 = 'https://raw.githubusercontent.com/massgravel/Microsoft-Activation-Scripts/35e044ddc85eed60b27b37c48371bd19cdc678b7/MAS/All-In-One-Version/MAS_AIO-CRC32_8C3AA7E0.cmd'
|
|
||||||
$DownloadURL2 = 'https://bitbucket.org/WindowsAddict/microsoft-activation-scripts/raw/35e044ddc85eed60b27b37c48371bd19cdc678b7/MAS/All-In-One-Version/MAS_AIO-CRC32_8C3AA7E0.cmd'
|
|
||||||
|
|
||||||
$URLs = @($DownloadURL1, $DownloadURL2)
|
|
||||||
$RandomURL1 = Get-Random -InputObject $URLs
|
|
||||||
$RandomURL2 = ($URLs -ne $RandomURL1)[0]
|
|
||||||
|
|
||||||
try {
|
|
||||||
$response = Invoke-WebRequest -Uri $RandomURL1 -UseBasicParsing
|
|
||||||
}
|
|
||||||
catch {
|
|
||||||
$response = Invoke-WebRequest -Uri $RandomURL2 -UseBasicParsing
|
|
||||||
}
|
|
||||||
|
|
||||||
$rand = [Guid]::NewGuid().Guid
|
|
||||||
$isAdmin = [bool]([Security.Principal.WindowsIdentity]::GetCurrent().Groups -match 'S-1-5-32-544')
|
|
||||||
$FilePath = if ($isAdmin) { "$env:SystemRoot\Temp\MAS_$rand.cmd" } else { "$env:TEMP\MAS_$rand.cmd" }
|
|
||||||
|
|
||||||
$ScriptArgs = "$args "
|
|
||||||
$prefix = "@::: $rand `r`n"
|
|
||||||
$content = $prefix + $response
|
|
||||||
Set-Content -Path $FilePath -Value $content
|
|
||||||
|
|
||||||
# Set ComSpec variable for current session in case its corrupt in the system
|
|
||||||
$env:ComSpec = "$env:SystemRoot\system32\cmd.exe"
|
|
||||||
Start-Process cmd.exe "/c """"$FilePath"" $ScriptArgs""" -Wait
|
|
||||||
|
|
||||||
$FilePaths = @("$env:TEMP\MAS*.cmd", "$env:SystemRoot\Temp\MAS*.cmd")
|
|
||||||
foreach ($FilePath in $FilePaths) { Get-Item $FilePath | Remove-Item }
|
|
84
index.html
Normal file
84
index.html
Normal file
@ -0,0 +1,84 @@
|
|||||||
|
# This script is hosted on <b>https://get.activated.win</b> for <b>https://massgrave.dev</b><hr><pre>
|
||||||
|
|
||||||
|
$troubleshoot = 'https://massgrave.dev/troubleshoot'
|
||||||
|
if ($ExecutionContext.SessionState.LanguageMode.value__ -ne 0) {
|
||||||
|
$ExecutionContext.SessionState.LanguageMode
|
||||||
|
Write-Host "Windows PowerShell is not running in Full Language Mode."
|
||||||
|
Write-Host "Help - https://gravesoft.dev/fix_powershell" -ForegroundColor White -BackgroundColor Blue
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
function Check3rdAV {
|
||||||
|
$avList = Get-CimInstance -Namespace root\SecurityCenter2 -Class AntiVirusProduct | Where-Object { $_.displayName -notlike '*windows*' } | Select-Object -ExpandProperty displayName
|
||||||
|
if ($avList) {
|
||||||
|
Write-Host '3rd party Antivirus might be blocking the script - ' -ForegroundColor White -BackgroundColor Blue -NoNewline
|
||||||
|
Write-Host " $($avList -join ', ')" -ForegroundColor DarkRed -BackgroundColor White
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
function CheckFile {
|
||||||
|
param ([string]$FilePath)
|
||||||
|
if (-not (Test-Path $FilePath)) {
|
||||||
|
Check3rdAV
|
||||||
|
Write-Host "Failed to create MAS file in temp folder, aborting!"
|
||||||
|
Write-Host "Help - $troubleshoot" -ForegroundColor White -BackgroundColor Blue
|
||||||
|
throw
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||||
|
$URLs = @(
|
||||||
|
'https://raw.githubusercontent.com/massgravel/Microsoft-Activation-Scripts/be7d101df5bf99d959b1f2d16557b88614ac7920/MAS/All-In-One-Version-KL/MAS_AIO.cmd',
|
||||||
|
'https://dev.azure.com/massgrave/Microsoft-Activation-Scripts/_apis/git/repositories/Microsoft-Activation-Scripts/items?path=/MAS/All-In-One-Version-KL/MAS_AIO.cmd&versionType=Commit&version=be7d101df5bf99d959b1f2d16557b88614ac7920',
|
||||||
|
'https://git.activated.win/massgrave/Microsoft-Activation-Scripts/raw/commit/be7d101df5bf99d959b1f2d16557b88614ac7920/MAS/All-In-One-Version-KL/MAS_AIO.cmd'
|
||||||
|
)
|
||||||
|
|
||||||
|
foreach ($URL in $URLs | Sort-Object { Get-Random }) {
|
||||||
|
try { $response = Invoke-WebRequest -Uri $URL -UseBasicParsing; break } catch {}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (-not $response) {
|
||||||
|
Check3rdAV
|
||||||
|
Write-Host "Failed to retrieve MAS from any of the available repositories, aborting!"
|
||||||
|
Write-Host "Help - $troubleshoot" -ForegroundColor White -BackgroundColor Blue
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
# Verify script integrity
|
||||||
|
$releaseHash = '6396F7EFE144AFCA1B48670D7F327F1275C90C3A7BD9AEC7641B9600BAA1DA9A'
|
||||||
|
$stream = New-Object IO.MemoryStream
|
||||||
|
$writer = New-Object IO.StreamWriter $stream
|
||||||
|
$writer.Write($response)
|
||||||
|
$writer.Flush()
|
||||||
|
$stream.Position = 0
|
||||||
|
$hash = [BitConverter]::ToString([Security.Cryptography.SHA256]::Create().ComputeHash($stream)) -replace '-'
|
||||||
|
if ($hash -ne $releaseHash) {
|
||||||
|
Write-Warning "Hash ($hash) mismatch, aborting!`nReport this issue at $troubleshoot"
|
||||||
|
$response = $null
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
# Check for AutoRun registry which may create issues with CMD
|
||||||
|
$paths = "HKCU:\SOFTWARE\Microsoft\Command Processor", "HKLM:\SOFTWARE\Microsoft\Command Processor"
|
||||||
|
foreach ($path in $paths) {
|
||||||
|
if (Get-ItemProperty -Path $path -Name "Autorun" -ErrorAction SilentlyContinue) {
|
||||||
|
Write-Warning "Autorun registry found, CMD may crash! `nManually copy-paste the below command to fix...`nRemove-ItemProperty -Path '$path' -Name 'Autorun'"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
$rand = [Guid]::NewGuid().Guid
|
||||||
|
$isAdmin = [bool]([Security.Principal.WindowsIdentity]::GetCurrent().Groups -match 'S-1-5-32-544')
|
||||||
|
$FilePath = if ($isAdmin) { "$env:SystemRoot\Temp\MAS_$rand.cmd" } else { "$env:USERPROFILE\AppData\Local\Temp\MAS_$rand.cmd" }
|
||||||
|
Set-Content -Path $FilePath -Value "@::: $rand `r`n$response"
|
||||||
|
CheckFile $FilePath
|
||||||
|
|
||||||
|
$env:ComSpec = "$env:SystemRoot\system32\cmd.exe"
|
||||||
|
$chkcmd = & $env:ComSpec /c "echo CMD is working"
|
||||||
|
if ($chkcmd -notcontains "CMD is working") {
|
||||||
|
Write-Warning "cmd.exe is not working.`nReport this issue at $troubleshoot"
|
||||||
|
}
|
||||||
|
saps -FilePath $env:ComSpec -ArgumentList "/c """"$FilePath"" $args""" -Wait
|
||||||
|
CheckFile $FilePath
|
||||||
|
|
||||||
|
$FilePaths = @("$env:SystemRoot\Temp\MAS*.cmd", "$env:USERPROFILE\AppData\Local\Temp\MAS*.cmd")
|
||||||
|
foreach ($FilePath in $FilePaths) { Get-Item $FilePath | Remove-Item }
|
Reference in New Issue
Block a user