" & vbCrLf &_
50 | "" & vbCrLf &_
51 | "" & vbCrLf &_
52 | ""
53 | WriteLog HTA,LogFile
54 | WriteLog Extract(Data),LogFile
55 | WriteLog "",LogFile
56 | ws.run chr(34) & LogFile & chr(34)
57 | '****************************************************************
58 | Function Extract(Data)
59 | Dim oRE,oMatches,Match,Line
60 | set oRE = New RegExp
61 | oRE.IgnoreCase = True
62 | oRE.Global = True
63 | oRE.MultiLine = True
64 | oRE.Pattern = "(?:(?!""giveaway_counter first"">)[\s\S])*
"
65 | set oMatches = oRE.Execute(Data)
66 | If not isEmpty(oMatches) then
67 | For Each Match in oMatches
68 | Line = Match.Value
69 | Extract = Line
70 | Next
71 | End if
72 | End Function
73 | '*****************************************************************
74 | Sub WriteLog(strText,LogFile)
75 | Dim fs,ts
76 | Const ForAppending = 8
77 | Set fs = CreateObject("Scripting.FileSystemObject")
78 | Set ts = fs.OpenTextFile(LogFile,ForAppending,True,-1)
79 | ts.WriteLine strText
80 | ts.Close
81 | End Sub
82 | '*****************************************************************
83 | Function Lang()
84 | Dim sComputer,oWMI,colOperatingSystems,oOS,iOSLang
85 | sComputer = "."
86 | Set oWMI = GetObject("winmgmts:" _
87 | & "{impersonationLevel=impersonate}!\\" _
88 | & sComputer _
89 | & "\root\cimv2")
90 | Set colOperatingSystems = oWMI.ExecQuery _
91 | ("Select * from Win32_OperatingSystem")
92 | For Each oOS in colOperatingSystems
93 | iOSLang = oOS.OSLanguage
94 | Next
95 | If (iOSLang = 1036) Then
96 | Lang = True
97 | Else
98 | Lang = False
99 | End If
100 | End Function
101 | '*****************************************************************
102 | Function IsInternetConnected()
103 | Dim MyLoop,strComputer,objPing,objStatus
104 | IsInternetConnected = False
105 | MyLoop = True
106 | While MyLoop = True
107 | strComputer = "smtp.gmail.com"
108 | Set objPing = GetObject("winmgmts:{impersonationLevel=impersonate}!\\").ExecQuery _
109 | ("select * from Win32_PingStatus where address = '" & strComputer & "'")
110 | For Each objStatus in objPing
111 | If objStatus.Statuscode = 0 Then
112 | MyLoop = False
113 | IsInternetConnected = True
114 | Exit Function
115 | End If
116 | Next
117 | MsgBox "Check your internet connection !",vbExclamation,"Check your internet connection !"
118 | Pause(10) 'To sleep for 10 secondes
119 | Wend
120 | End Function
121 | '******************************************************************
122 | Sub Pause(NSeconds)
123 | Wscript.Sleep(NSeconds*1000)
124 | End Sub
125 | '****************************************************************
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/InfoBattery.bat:
--------------------------------------------------------------------------------
1 | :: https://github.com/byte3ater/Batch-Utilities/blob/master/Battery-Report.bat
2 | ::Detects the version of windows and runs the correct powercfg.
3 | :: Written by 4C1DB3RN
4 |
5 |
6 | @echo off
7 | color 0A
8 | Mode con cols=70 lines=5
9 | Title Automatically check and get admin rights
10 |
11 | :: Automatically check and get admin rights
12 | :::::::::::::::::::::::::::::::::::::::::
13 | Set TmpLogFile=TmpLogkey.txt
14 | Set LogFile=Startup_key_Log.txt
15 | If Exist %TmpLogFile% Del %TmpLogFile%
16 | If Exist %LogFile% Del %LogFile%
17 | REM --> Check for permissions
18 | Reg query "HKU\S-1-5-19\Environment" >%TmpLogFile% 2>&1
19 | REM --> If error flag set, we do not have admin.
20 | if '%errorlevel%' NEQ '0' (
21 | Echo.
22 | ECHO **************************************
23 | ECHO Running Admin shell... Please wait...
24 | ECHO **************************************
25 |
26 | goto UACPrompt
27 | ) else ( goto gotAdmin )
28 |
29 | :UACPrompt
30 | echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs"
31 | set params = %*:"=""
32 | echo UAC.ShellExecute "cmd.exe", "/c ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs"
33 |
34 | "%temp%\getadmin.vbs"
35 | del "%temp%\getadmin.vbs"
36 | exit /B
37 |
38 | :gotAdmin
39 |
40 | ::::::::::::::::::::::::::::
41 | ::START
42 | ::::::::::::::::::::::::::::
43 | REM start code here
44 |
45 | chcp 28591 > nul
46 | @echo off
47 |
48 | Title title Battery Report Generator FazCode
49 |
50 | powercfg /batteryreport /Output C:\ProgramData\ABOAT\UnlockSoftwares\battery-report.html
51 | Start C:\ProgramData\ABOAT\UnlockSoftwares\battery-report.html
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/KasperskyX32.bat:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/KasperskyX32.bat
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/KasperskyX64.bat:
--------------------------------------------------------------------------------
1 | echo
2 | reg add HKLM\SOFTWARE\Wow6432Node\KasperskyLab\AVP17.0.0\settings\ /v Ins_InitMode /d "1" /t REG_DWORD /f
3 | reg delete HKLM\SOFTWARE\Wow6432Node\KasperskyLab\LicStrg /f
4 | reg delete HKLM\SOFTWARE\Microsoft\SystemCertificates\SPC /f
5 | RD /S /Q "C:\ProgramData\Kaspersky Lab\AVP17.0.0\Report"
6 | reg add HKLM\SOFTWARE\Wow6432Node\KasperskyLab\AVP17.0.0 /v LastLicenseNotificationTime /d "1500000000" /t REG_SZ /f
7 | reg add HKCU\SOFTWARE\Wow6432Node\KasperskyLab\AVP17.0.0 /v HidePromo /t REG_DWORD /d "1" /f
8 | pause
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/LISTE DE COMMANDES.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/LISTE DE COMMANDES.txt
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/LicenseDiag.bat:
--------------------------------------------------------------------------------
1 | Title Multi Crack
2 | cd C:\
3 | cls
4 | licensingdiag.exe -report "C:\ProgramData\ABOAT\MultiCrack\reportLicenseDia.txt" -log "C:\ProgramData\ABOAT\MultiCrack\reportLicenseDia.cab"
5 | Start C:\ProgramData\ABOAT\MultiCrack\reportLicenseDia.cab
6 | Start C:\ProgramData\ABOAT\MultiCrack\reportLicenseDia.txt
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Network-Identity.bat:
--------------------------------------------------------------------------------
1 | @goto :batch
2 |
3 |
4 | =========================================================================================
5 | if there are any updates made to this App newest
6 | version can be found at http://batch.nhserver.ml
7 |
8 | by ImDeepWithWindows from http://HackForums.net
9 | =========================================================================================
10 |
11 |
12 | :batch
13 | @echo off
14 | title %~n0
15 | color 1b
16 | echo.>"%homedrive%\AdminPriv.test"
17 | if exist "%homedrive%\AdminPriv.test" goto :has_uac_elev
18 | cls
19 | echo.--
20 | echo.This App requires UAC elivation to make changes,
21 | echo.run this program as Administrator to use it.
22 | echo.--
23 | echo.
24 | echo.
25 | echo.tap ^ to continue
26 | pause >nul
27 | goto :eof
28 | :has_uac_elev
29 | del /f /q "%homedrive%\AdminPriv.test" >nul
30 | setlocal EnableDelayedExpansion
31 | :menu
32 | for /f "tokens=5 skip=5" %%A in ('netsh int ipv4 show ipaddress') do set "CurrIP=%%A" & goto :GotIP
33 | :GotIP
34 | cls
35 | echo.--
36 | echo.Current network IP-Address of this computer: [ %CurrIP% ]
37 | echo.Current network DNS-name of this computer: [ \\%computername% ]
38 | echo.--
39 | echo.
40 | echo.
41 | if NOT "%newdns%"=="" echo. & echo.when computer reboots network DNS-name will be: [ \\%newdns% ] & echo. & echo. & echo.
42 | echo.tap "I" to use a custom network IP-Address
43 | echo.tap "D" to use a custom network DNS-name
44 | choice /c id /n
45 | cls
46 | if %errorlevel% equ 2 goto :changeDNS
47 |
48 |
49 | for /f "tokens=1,2,3,4 delims=." %%A in ('echo %CurrIP%') do set /a "plusten=%%D+10" & set "defaultnewip=%%A.%%B.%%C.%plusten%"
50 | echo.--
51 | echo.Computer's current Network IP-Address: [ %CurrIP% ]
52 | echo.leave blank for no change
53 | echo.--
54 | echo.
55 | echo.
56 | set/p "newip=[NewIP]:"
57 | if "%newip%"=="" goto :menu
58 | for /f "skip=1 delims=: tokens=2" %%A in ('netsh int ipv4 show ipaddress') do set "tmpvar1=%%A" & set "interface=!tmpvar1:~1!" & goto :GotInterfaceName
59 | :GotInterfaceName
60 | for /f "tokens=2 delims=:" %%A in ('netsh int ipv4 show address ^| find /I "Default Gateway"') do set "tmpvar=%%A" & set "gateway=!tmpvar: =!"
61 | for /f "tokens=2 delims=:" %%A in ('ipconfig ^| find /I "Subnet Mask"') do set "tmpvar2=%%A" & set "mask=!tmpvar2:~1!"
62 | netsh int ipv4 set address name="!interface!" static !newip! !mask! !gateway! >nul
63 | goto :menu
64 |
65 | :changeDNS
66 | echo.--
67 | echo.Computer's current Network DNS-Name: [ \\%computername% ]
68 | echo.leave blank for no change
69 | echo.--
70 | echo.
71 | echo.
72 | set/p "newdns=[NewDNS]:"
73 | if "%newdns%"=="" goto :menu
74 | if "%newdns:~0,2%"=="\\" set "newdns=%newdns:~2%"
75 | wmic computersystem where caption="!computername!" rename "!newdns!" >nul
76 | cls
77 | echo.--
78 | echo.changes will take effect on reboot
79 | echo.--
80 | echo.
81 | echo.
82 | echo.tap ^ to continue
83 | @pause >nul
84 | goto :menu
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Office Key Recovery.bat:
--------------------------------------------------------------------------------
1 | @Echo Off
2 | Mode con cols=90 lines=30
3 |
4 | cscript "C:\Program Files\Microsoft Office\Office14\OSPP.VBS" /dstatus
5 | IF NOT %ERRORLEVEL% == 0 GOTO Suite1
6 | cscript "C:\Program Files\Microsoft Office\Office14\OSPP.VBS" /dstatus > C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt & start C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt
7 | Exit
8 | :Suite1
9 |
10 | CLS
11 | cscript "C:\Program Files\Microsoft Office\Office15\OSPP.VBS" /dstatus
12 | IF NOT %ERRORLEVEL% == 0 GOTO Suite2
13 | cscript "C:\Program Files\Microsoft Office\Office15\OSPP.VBS" /dstatus > C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt & start C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt
14 | Exit
15 | :Suite2
16 |
17 | CLS
18 | cscript "C:\Program Files (x86)\Microsoft Office\Office14\OSPP.VBS" /dstatus
19 | IF NOT %ERRORLEVEL% == 0 GOTO Suite3
20 | cscript "C:\Program Files (x86)\Microsoft Office\Office14\OSPP.VBS" /dstatus > C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt & start C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt
21 | Exit
22 | :Suite3
23 |
24 | CLS
25 | cscript "C:\Program Files\Microsoft Office\Office14\OSPP.VBS" /dstatus
26 | IF NOT %ERRORLEVEL% == 0 GOTO Suite4
27 | cscript "C:\Program Files\Microsoft Office\Office14\OSPP.VBS" /dstatus > C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt & start C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt
28 | Exit
29 | :Suite4
30 |
31 | CLS
32 | cscript "C:\Program Files (x86)\Microsoft Office\Office15\OSPP.VBS" /dstatus
33 | IF NOT %ERRORLEVEL% == 0 GOTO Suite5
34 | cscript "C:\Program Files (x86)\Microsoft Office\Office15\OSPP.VBS" /dstatus > C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt & start C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt
35 | Exit
36 | :Suite5
37 |
38 | CLS
39 | cscript "C:\Program Files\Microsoft Office\Office15\OSPP.VBS" /dstatus > C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt
40 | IF NOT %ERRORLEVEL% == 0 GOTO Suite6
41 | cscript "C:\Program Files\Microsoft Office\Office15\OSPP.VBS" /dstatus > C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt & start C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt
42 | Exit
43 | :Suite6
44 |
45 | CLS
46 | cscript "C:\Program Files\Microsoft Office\Office16\OSPP.VBS" /dstatus
47 | IF NOT %ERRORLEVEL% == 0 GOTO Suite7
48 | cscript "C:\Program Files\Microsoft Office\Office16\OSPP.VBS" /dstatus > C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt & start C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt
49 | Exit
50 | :Suite7
51 |
52 | CLS
53 | cscript "C:\Program Files (x86)\Microsoft Office\Office16\OSPP.VBS" /dstatus
54 | IF NOT %ERRORLEVEL% == 0 GOTO Suite8
55 | cscript "C:\Program Files (x86)\Microsoft Office\Office16\OSPP.VBS" /dstatus > C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt & start C:\ProgramData\ABOAT\MultiCrack\ConfigOffice.txt
56 | Exit
57 | :Suite8
58 |
59 | CLS
60 | Color 4
61 | Echo Echec impossible de retrouver la license Office
62 | Pause
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/ProductKey.vbs:
--------------------------------------------------------------------------------
1 | Set WshShell = CreateObject("WScript.Shell")
2 | wscript.echo ConvertToKey(WshShell.RegRead("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId"))
3 |
4 | Function ConvertToKey(Key)
5 | Const KeyOffset = 52
6 | i = 28
7 | Chars = "BCDFGHJKMPQRTVWXY2346789"
8 | Do
9 | Cur = 0
10 | x = 14
11 | Do
12 | Cur = Cur * 256
13 | Cur = Key(x + KeyOffset) + Cur
14 | Key(x + KeyOffset) = (Cur \ 24) And 255
15 | Cur = Cur Mod 24
16 | x = x -1
17 | Loop While x >= 0
18 | i = i -1
19 | KeyOutput = Mid(Chars, Cur + 1, 1) & KeyOutput
20 | If (((29 - i) Mod 6) = 0) And (i <> -1) Then
21 | i = i -1
22 | KeyOutput = "-" & KeyOutput
23 | End If
24 | Loop While i >= 0
25 | ConvertToKey = KeyOutput
26 | End Function
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Remove_Add_to_Windows_Media_Player_list_context_menu.reg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/Remove_Add_to_Windows_Media_Player_list_context_menu.reg
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Remove_Quick_access_from_navigation_pane.reg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/Remove_Quick_access_from_navigation_pane.reg
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Remove_Share_with_from_context_menu.reg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/Remove_Share_with_from_context_menu.reg
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/RestartEnAdmin.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | Mode con cols=20 lines=3
3 | set "TmpLog=%Tmp%\TmpLog.txt"
4 | set "Log=%~dp0%computername%_%~n0.txt"
5 | set "MyVBSFile=%~dp0%~n0_On_Boot.vbs"
6 | set "Value=CHKDSK_ON_BOOT"
7 | Set "Key=HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce"
8 | If Exist "%TmpLog%" Del "%TmpLog%"
9 | If exist "%Log%" Del "%Log%"
10 | Reg query "HKU\S-1-5-19\Environment" >nul 2>&1
11 | if '%errorlevel%' NEQ '0' (
12 | goto UACPrompt
13 | ) else ( goto gotAdmin )
14 |
15 | :UACPrompt
16 | Mode con cols=20 lines=3
17 | echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs"
18 | set params = %*:"=""
19 | echo UAC.ShellExecute "cmd.exe", "/c ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs"
20 |
21 | "%temp%\getadmin.vbs"
22 | del "%temp%\getadmin.vbs"
23 | exit /B
24 |
25 | :gotAdmin
26 | Mode con cols=20 lines=3
27 | ::::::::::::::::::::::::::::
28 | :: START ::
29 | ::::::::::::::::::::::::::::
30 | for /f "delims=" %%a in (C:\ProgramData\ABOAT\UnlockSoftwares\CheminComplet.txt) do start %%a
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/SVCHOST_CHECKER.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | REM First release on 01/03/2017 @ 04:45 by Hackoo
3 | REM Updated on 07/03/2017 @ 04:05
4 | Set "ProcessName=SVCHOST"
5 | Set "Tmp_Services=%Tmp%\%~n0.txt"
6 | If Exist "%Tmp_Services%" Del "%Tmp_Services%"
7 | Set "ProcessLog=%Tmp%\%ProcessName%.log"
8 | If Exist "%ProcessLog%" Del "%ProcessLog%"
9 | Set "Legits_Services_SVCHOST=%~dp0Legits_Services_%ProcessName%.txt"
10 | Set "Legit_Location=%windir%\system32\svchost.exe"
11 | Set "LogFile=%~dp0%ProcessName%_ProcessList.txt"
12 | Set "Suspicious_LogFile=%~dp0%ComputerName%_%ProcessName%_Suspicious_Paths.txt"
13 | Title Finding all instances and paths of "%ProcessName%" by Hackoo 2017
14 | If Exist "%LogFile%" Del "%LogFile%"
15 | Set /A Counter=0
16 | setlocal enableDelayedExpansion
17 | for /F "skip=1" %%a in ('WMIC Path win32_process where "name like '%%%ProcessName%%%'" get commandline') do (
18 | for /F "delims=" %%b in ("%%a") do (
19 | Color 0A
20 | set /A Counter+=1
21 | set "p=%%b"
22 | for /f %%f in ('echo !p! ^|Findstr /LI "%Legit_Location%"') do (
23 | echo [!Counter!] : !p!
24 | )
25 | ( echo "!p!" )>>"%LogFile%"
26 | )
27 | )
28 |
29 | Powershell.exe Get-WmiObject Win32_Process ^| select ProcessID,ProcessName,Handle,commandline,ExecutablePath ^| Out-File -Append "%ProcessLog%" -Encoding ascii
30 | Type "%ProcessLog%" | find /i "%Legit_Location%" > "%Tmp_Services%"
31 |
32 | (
33 | echo(
34 | echo Those are legitimes services of "%ProcessName%.exe"
35 | Tasklist /SVC /FO TABLE /FI "IMAGENAME eq %ProcessName%.exe"
36 | )>con
37 |
38 | (
39 | echo(
40 | echo Those are legitimes services of "%ProcessName%.exe"
41 | Tasklist /SVC /FO TABLE /FI "IMAGENAME eq %ProcessName%.exe"
42 | )>> "%Tmp_Services%"
43 | CMD /U /C Type "%Tmp_Services%" > "%Legits_Services_SVCHOST%"
44 | echo(
45 | Echo All instances of "%ProcessName%" in this path "%Legit_Location%" are legitimes services
46 | echo(
47 | echo Hit any key to look for a suspicious "%ProcessName%" paths
48 | Findstr /LVI "%Legit_Location%" "%LogFile%" > "%Suspicious_LogFile%"
49 | pause>nul
50 | Start "" "%Suspicious_LogFile%"
51 | Start "" "%Legits_Services_SVCHOST%" & exit
52 | ::******************************************************************************?************
53 | This guy is awesome
54 |
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Sarahah.vbs:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/Sarahah.vbs
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Screenshot_6.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/Screenshot_6.jpg
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Snagit.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/Snagit.txt
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Turn_Off_AutoPlay.reg:
--------------------------------------------------------------------------------
1 | Windows Registry Editor Version 5.00
2 |
3 | ; Created by: Shawn Brink
4 | ; Created on: June 16th 2015
5 | ; Tutorial: https://www.tenforums.com/tutorials/7119-turn-off-autoplay-windows-10-a.html
6 |
7 |
8 | [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers]
9 | "DisableAutoplay"=dword:00000001
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Turn_Off_Fast_Startup.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 |
3 | :: Created by: Shawn Brink
4 | :: http://www.tenforums.com
5 | :: Tutorial: http://www.tenforums.com/tutorials/4189-fast-startup-turn-off-windows-10-a.html
6 |
7 |
8 | :: To turn off Fast Startup
9 | REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /V HiberbootEnabled /T REG_dWORD /D 0 /F
10 |
11 |
12 |
13 |
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Turn_On_AutoPlay.reg:
--------------------------------------------------------------------------------
1 | Windows Registry Editor Version 5.00
2 |
3 | ; Created by: Shawn Brink
4 | ; Created on: June 16th 2015
5 | ; Tutorial: https://www.tenforums.com/tutorials/7119-turn-off-autoplay-windows-10-a.html
6 |
7 |
8 | [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers]
9 | "DisableAutoplay"=dword:00000000
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Turn_On_Fast_Startup.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 |
3 | :: Created by: Shawn Brink
4 | :: http://www.tenforums.com
5 | :: Tutorial: http://www.tenforums.com/tutorials/4189-fast-startup-turn-off-windows-10-a.html
6 |
7 |
8 | :: To enable hibernate
9 | powercfg -h on
10 |
11 |
12 | :: To turn on Fast Startup
13 | REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Power" /V HiberbootEnabled /T REG_dWORD /D 1 /F
14 |
15 |
16 |
17 |
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/WIN10AntiTelemetry.bat:
--------------------------------------------------------------------------------
1 | ::::::::::::::::::::::::::::::::::::::::::::::::
2 | :: This tool was updated on 3/8/17 by mf666 ::
3 | ::Read the about section for more information!::
4 | :: ::
5 | :: Contact: mf666@protonmail.ch ::
6 | ::::::::::::::::::::::::::::::::::::::::::::::::
7 |
8 | @echo off
9 | set TTL=title mf666's Anti-Telemetry Tool -
10 |
11 | %TTL% LOADING...
12 | color 70
13 | set HOSTS=%windir%\System32\drivers\etc\hosts
14 | net start "task scheduler" > nul
15 |
16 |
17 | :MENU
18 | cls
19 | %TTL% Menu
20 | echo Welcome to mf666's Anti-Telemetry Tool! (Updated 02/06/17)
21 | echo.
22 | echo This tool was designed to help you fully anonymize your installation of Windows 10.
23 | echo.
24 | echo 1. Disable telemetry on this computer (ADMIN ONLY)
25 | echo 2. About this tool!
26 | echo 3. Exit
27 |
28 | set /P input=Select an option (1,2,3):
29 |
30 | if "%input%"=="1" goto :SURE
31 | if "%input%"=="2" goto :ABOUT
32 | if "%input%"=="3" goto :EX
33 |
34 | goto MENU
35 |
36 | :SURE
37 | cls
38 | %TTL% Are you sure?
39 | echo Please take a second to think about what you are doing. I'm not liable for anything you choose to do using this script.
40 | echo.
41 | echo !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
42 | echo !!!Take a second to verify that you have run this script as an ADMINISTRATOR!!!
43 | echo !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
44 | echo.
45 | set /P input=Would you like to fully anonymize this machine? ^(y/n^)
46 |
47 | if "%input%"=="y" goto :ANON
48 | if "%input%"=="n" goto :MENU
49 |
50 | goto :SURE
51 |
52 | :ANON
53 | cls
54 | %TTL% ANONYMIZING YOUR MACHINE, PLEASE WAIT...
55 |
56 | echo Now BLOCKING all Telemetry hosts...
57 | (
58 | echo #BEGIN MF666 ANTI-TELEMETRY
59 | echo 0.0.0.0 choice.microsoft.com
60 | echo 0.0.0.0 choice.microsoft.com.nstac.net
61 | echo 0.0.0.0 df.telemetry.microsoft.com
62 | echo 0.0.0.0 oca.telemetry.microsoft.com
63 | echo 0.0.0.0 oca.telemetry.microsoft.com.nsatc.net
64 | echo 0.0.0.0 redir.metaservices.microsoft.com
65 | echo 0.0.0.0 reports.wes.df.telemetry.microsoft.com
66 | echo 0.0.0.0 services.wes.df.telemetry.microsoft.com
67 | echo 0.0.0.0 settings-sandbox.data.microsoft.com
68 | echo 0.0.0.0 settings-win.data.microsoft.com
69 | echo 0.0.0.0 sqm.df.telemetry.microsoft.com
70 | echo 0.0.0.0 sqm.telemetry.microsoft.com
71 | echo 0.0.0.0 sqm.telemetry.microsoft.com.nsatc.net
72 | echo 0.0.0.0 telecommand.telemetry.microsoft.com
73 | echo 0.0.0.0 telecommand.telemetry.microsoft.com.nsatc.net
74 | echo 0.0.0.0 telemetry.appex.bing.net
75 | echo 0.0.0.0 telemetry.microsoft.com
76 | echo 0.0.0.0 telemetry.urs.microsoft.com
77 | echo 0.0.0.0 vortex-sandbox.data.microsoft.com
78 | echo 0.0.0.0 vortex-win.data.microsoft.com
79 | echo 0.0.0.0 vortex.data.microsoft.com
80 | echo 0.0.0.0 watson.telemetry.microsoft.com
81 | echo 0.0.0.0 watson.telemetry.microsoft.com.nsatc.net
82 | echo 0.0.0.0 watson.ppe.telemetry.microsoft.com
83 | echo 0.0.0.0 wes.df.telemetry.microsoft.com
84 | echo 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net
85 | echo 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net
86 | echo 0.0.0.0 watson.live.com
87 | echo 0.0.0.0 watson.microsoft.com
88 | echo 0.0.0.0 feedback.search.microsoft.com
89 | echo 0.0.0.0 feedback.windows.com
90 | echo 0.0.0.0 corp.sts.microsoft.com
91 | echo 0.0.0.0 diagnostics.support.microsoft.com
92 | echo 0.0.0.0 i1.services.social.microsoft.com
93 | echo 0.0.0.0 i1.services.social.microsoft.com.nsatc.net
94 | echo 0.0.0.0 vortex-bn2.metron.live.com.nsatc.net
95 | echo 0.0.0.0 vortex-cy2.metron.live.com.nsatc.net
96 | echo 0.0.0.0 ca.telemetry.microsoft.com
97 | echo 0.0.0.0 cache.datamart.windows.com
98 | echo 0.0.0.0 spynet2.microsoft.com
99 | echo 0.0.0.0 spynetalt.microsoft.com
100 | echo 0.0.0.0 a.ads1.msn.com
101 | echo 0.0.0.0 a.ads2.msads.net
102 | echo 0.0.0.0 a.ads2.msn.com
103 | echo 0.0.0.0 a.rad.msn.com
104 | echo 0.0.0.0 a-0001.a-msedge.net
105 | echo 0.0.0.0 a-0002.a-msedge.net
106 | echo 0.0.0.0 a-0003.a-msedge.net
107 | echo 0.0.0.0 a-0004.a-msedge.net
108 | echo 0.0.0.0 a-0005.a-msedge.net
109 | echo 0.0.0.0 a-0006.a-msedge.net
110 | echo 0.0.0.0 a-0007.a-msedge.net
111 | echo 0.0.0.0 a-0008.a-msedge.net
112 | echo 0.0.0.0 a-0009.a-msedge.net
113 | echo 0.0.0.0 ac3.msn.com
114 | echo 0.0.0.0 ad.doubleclick.net
115 | echo 0.0.0.0 adnexus.net
116 | echo 0.0.0.0 adnxs.com
117 | echo 0.0.0.0 ads.msn.com
118 | echo 0.0.0.0 ads1.msads.net
119 | echo 0.0.0.0 ads1.msn.com
120 | echo 0.0.0.0 aidps.atdmt.com
121 | echo 0.0.0.0 aka-cdn-ns.adtech.de
122 | echo 0.0.0.0 a-msedge.net
123 | echo 0.0.0.0 apps.skype.com
124 | echo 0.0.0.0 az361816.vo.msecnd.net
125 | echo 0.0.0.0 az512334.vo.msecnd.net
126 | echo 0.0.0.0 b.ads1.msn.com
127 | echo 0.0.0.0 b.ads2.msads.net
128 | echo 0.0.0.0 b.rad.msn.com
129 | echo 0.0.0.0 bs.serving-sys.com
130 | echo 0.0.0.0 c.atdmt.com
131 | echo 0.0.0.0 c.msn.com
132 | echo 0.0.0.0 cdn.atdmt.com
133 | echo 0.0.0.0 cds26.ams9.msecn.net
134 | echo 0.0.0.0 compatexchange.cloudapp.net
135 | echo 0.0.0.0 corpext.msitadfs.glbdns2.microsoft.com
136 | echo 0.0.0.0 cs1.wpc.v0cdn.net
137 | echo 0.0.0.0 db3aqu.atdmt.com
138 | echo 0.0.0.0 ec.atdmt.com
139 | echo 0.0.0.0 fe2.update.microsoft.com.akadns.net
140 | echo 0.0.0.0 feedback.microsoft-hohm.com
141 | echo 0.0.0.0 flex.msn.com
142 | echo 0.0.0.0 g.msn.com
143 | echo 0.0.0.0 h1.msn.com
144 | echo 0.0.0.0 lb1.www.ms.akadns.net
145 | echo 0.0.0.0 live.rads.msn.com
146 | echo 0.0.0.0 m.adnxs.com
147 | echo 0.0.0.0 m.hotmail.com
148 | echo 0.0.0.0 msedge.net
149 | echo 0.0.0.0 msftncsi.com
150 | echo 0.0.0.0 msnbot-65-55-108-23.search.msn.com
151 | echo 0.0.0.0 msntest.serving-sys.com
152 | echo 0.0.0.0 pre.footprintpredict.com
153 | echo 0.0.0.0 preview.msn.com
154 | echo 0.0.0.0 pricelist.skype.com
155 | echo 0.0.0.0 rad.live.com
156 | echo 0.0.0.0 rad.msn.com
157 | echo 0.0.0.0 s.gateway.messenger.live.com
158 | echo 0.0.0.0 s0.2mdn.net
159 | echo 0.0.0.0 schemas.microsoft.akadns.net
160 | echo 0.0.0.0 secure.adnxs.com
161 | echo 0.0.0.0 secure.flashtalking.com
162 | echo 0.0.0.0 sls.update.microsoft.com.akadns.net
163 | echo 0.0.0.0 static.2mdn.net
164 | echo 0.0.0.0 statsfe1.ws.microsoft.com
165 | echo 0.0.0.0 statsfe2.update.microsoft.com.akadns.net
166 | echo 0.0.0.0 statsfe2.ws.microsoft.com
167 | echo 0.0.0.0 survey.watson.microsoft.com
168 | echo 0.0.0.0 view.atdmt.com
169 | echo 0.0.0.0 www.msftncsi.com
170 | echo #END MF666 ANTI-TELEMETRY
171 | ) > %HOSTS%
172 | echo Blocking hosts successful!
173 | echo. & ping localhost -n 2 > nul
174 |
175 | echo Now blocking Bing...
176 | echo 0.0.0.0 204.79.197.200 >> %HOSTS%
177 | echo Bing blocked!
178 | echo. & ping localhost -n 2 > nul
179 |
180 | echo Disabling telemetry services...
181 | sc stop DiagTrack
182 | sc config DiagTrack start= disabled
183 | sc stop dmwappushservice
184 | sc config dmwappushservice start= disabled
185 | echo Stopping telemetry services successful!
186 | echo. & ping localhost -n 2 > nul
187 |
188 | echo Disallowing the telemetry group policy...
189 | REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\DataCollection /v AllowTelemetry /t REG_DWORD /d 0 /f
190 | echo. & ping localhost -n 2 > nul
191 |
192 | echo Disallowing the CEIP group policy...
193 | REG ADD HKLM\SOFTWARE\Policies\Microsoft\SQMClient\Windows /v CEIPEnable /t REG_DWORD /d 0 /f
194 | echo Success!
195 | echo. & ping localhost -n 2 > nul
196 |
197 | echo Disabling CEIP scheduled tasks...
198 | schtasks /change /tn "Microsoft\Windows\Application Experience\Microsoft Compatibility Appraiser" /disable
199 | schtasks /change /tn "Microsoft\Windows\Application Experience\ProgramDataUpdater" /disable
200 | schtasks /change /tn "Microsoft\Windows\Autochk\Proxy" /disable
201 | schtasks /change /tn "Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector" /disable
202 | schtasks /change /tn "Microsoft\Windows\Customer Experience Improvement Program\Consolidator" /disable
203 | echo Disabling CEIP scheduled tasks successful!
204 | echo. & ping localhost -n 2 > nul
205 |
206 | echo Disabling AIP telemetry group policy...
207 | REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat /v AITEnable /t REG_DWORD /d 0 /f
208 | echo. & ping localhost -n 2 > nul
209 |
210 | echo Disabling steps recorder group policy...
211 | REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\AppCompat /v DisableUAR /t REG_DWORD /d 1 /f
212 | echo. & ping localhost -n 2 > nul
213 |
214 | echo Disabling WiFi (HotSpot Sharing) group policy...
215 | REG ADD HKLM\SOFTWARE\Microsoft\PolicyManager\default\Wifi\AllowWiFiHotspotReporting /v value /t REG_DWORD /d 0 /f
216 | REG ADD HKLM\SOFTWARE\Microsoft\PolicyManager\default\Wifi\AllowAutoConnectToWiFiSenseHotspots /v value /t REG_DWORD /d 0 /f
217 | echo. & ping localhost -n 2 > nul
218 |
219 | echo Disabling adverising ID usage...
220 | REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo /v Enabled /t REG_DWORD /d 0 /f
221 | echo. & ping localhost -n 2 > nul
222 |
223 | echo Disabling P2P Windows Updates outside of your local network...
224 | REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config /v DODownloadMode /t REG_DWORD /d 0 /f
225 | REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization /v SystemSettingsDownloadMode /t REG_DWORD /d 3 /f
226 | echo. & ping localhost -n 2 > nul
227 |
228 | echo Disabling sensors...
229 | REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\LocationAndSensors /v DisableSensors /t REG_DWORD /d 1 /f
230 | REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\Personalization /v NoLockScreenCamera /t REG_DWORD /d 1 /f
231 | echo. & ping localhost -n 2 > nul
232 |
233 | echo Disabling handwriting data sharing...
234 | REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\TabletPC /v PreventHandwritingDataSharing /t REG_DWORD /d 1 /f
235 | echo. & ping localhost -n 2 > nul
236 |
237 | echo Disabling websearch group policy...
238 | REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v DisableWebSearch /t REG_DWORD /d 1 /f
239 | REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v ConnectedSearchUseWeb /t REG_DWORD /d 0 /f
240 | REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v ConnectedSearchUseWebOverMeteredConnections /t REG_DWORD /d 0 /f
241 | echo. & ping localhost -n 2 > nul
242 |
243 | echo Disabling Cortana group policy...
244 | REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v AllowCortana /t REG_DWORD /d 0 /f
245 | REG ADD HKLM\SOFTWARE\Microsoft\PolicyManager\default\Experience\AllowCortana /v value /t REG_DWORD /d 0 /f
246 | echo. & ping localhost -n 2 > nul
247 |
248 | echo Disabling remote registry service...
249 | sc stop RemoteRegistry
250 | sc config RemoteRegistry start= disabled
251 | echo. & ping localhost -n 2 > nul
252 |
253 | echo Success!
254 |
255 | :ONEDRIVE
256 | echo.
257 | echo Would you like to disable OneDrive servives and group policy? This will prevent the Windows Mail app from working properly...
258 | set /P input=^(y/n^):
259 | if "%input%"=="y" goto :ONEDRIVEY
260 | if "%input%"=="n" goto :ONEDRIVEN
261 |
262 | goto :ONEDRIVE
263 |
264 | :ONEDRIVEY
265 | echo.
266 | echo Disabling OneDrive services...
267 | sc stop OneSyncSvc
268 | sc config OneSyncSvc start= disabled
269 | sc stop OneSyncSvc_Session1
270 | sc config OneSyncSvc_Session1 start= disabled
271 | echo. & ping localhost -n 2 > nul
272 |
273 | echo Disabling OneDrive group policy...
274 | REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive /v DisableFileSyncNGSC /t REG_DWORD /d 1 /f
275 | REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\OneDrive /v DisableLocation /t REG_DWORD /d 1 /f
276 | echo. & ping localhost -n 2 > nul
277 | goto :COMPLETE
278 |
279 | :ONEDRIVEN
280 | echo OneDrive serives and group policy skipped...
281 | echo.
282 |
283 | :COMPLETE
284 | cls
285 | %TTL% Anonymization Complete!
286 | echo Telemetry on this device has been disabled!
287 | pause
288 |
289 | :ABOUT
290 | cls
291 | %TTL% About...
292 | echo [mf666's Anti-Telemetry Tool]
293 | echo.
294 | echo I created this tool as a follow-up to my Cortana Disabling Utility that I made a long time ago.
295 | echo This tool will help you create a safer and more private environment on your Windows 10 machine.
296 | echo Please feel free to modify and distribute this script as you see fit. Its yours now.
297 | echo.
298 | echo Please email me @ mf666@protonmail.ch with any suggestions/questions!
299 | echo.
300 | pause
301 | goto :MENU
302 |
303 | :EX
304 | cls
305 | %TTL% Exiting...
306 | echo Good bye...
307 | ping localhost > nul
308 | exit
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Wifi Passwords Recovery.bat:
--------------------------------------------------------------------------------
1 | @echo off & setlocal enabledelayedexpansion
2 | Set ""
3 | Title %~n0 %Copyright%
4 | Mode con cols=90 lines=30
5 | cls & color 0A & echo.
6 | echo ***********************************************
7 | echo %~n0 %Copyright%
8 | echo ***********************************************
9 | echo(
10 | if _%1_==_Main_ goto :Main
11 | Set Count=0
12 | Set L=0
13 | :getadmin
14 | echo %~nx0 : self elevating
15 | set vbs=%temp%\getadmin.vbs
16 | (
17 | echo Set UAC = CreateObject^("Shell.Application"^)
18 | echo UAC.ShellExecute "%~s0", "Main %~sdp0 %*", "", "runas", 1
19 | )> "%vbs%"
20 | "%temp%\getadmin.vbs"
21 | del "%temp%\getadmin.vbs"
22 | goto :eof
23 | ::*************************************************************************************
24 | :Main
25 | Call :init
26 | Call :CountLines
27 | Set "PasswordLog=%~dp0Wifi_Passwords_on_%ComputerName%.txt"
28 | %Mod%
29 | echo(
30 | echo ***********************************************
31 | echo %~n0 %Copyright%
32 | echo ***********************************************
33 | echo(
34 | Call :Color 0E " [N][SSID] ================ Password" 1
35 | echo(
36 | (
37 | echo ***********************************************
38 | echo %~n0 %Copyright%
39 | echo ***********************************************
40 | echo(
41 | echo [N][SSID] ==============^> "Password"
42 | echo(
43 |
44 | )>"%PasswordLog%"
45 | for /f "skip=2 delims=: tokens=2" %%a in ('netsh wlan show profiles') do (
46 | if not "%%a"=="" (
47 | set "ssid=%%a"
48 | set "ssid=!ssid:~1!"
49 | call :Getpassword "!ssid!"
50 | )
51 | )
52 | echo(
53 | echo Done
54 | If exist "%PasswordLog%" start "" "%PasswordLog%"
55 | pause>nul
56 | exit
57 | ::*************************************************************************************
58 | :Getpassword
59 | set "name=%1"
60 | set "name=!name:"=!"
61 | Set "passwd="
62 | for /f "delims=: tokens=2" %%a in ('netsh wlan show profiles %1 key^=clear ^|find /I "Cont"') do (
63 | set "passwd=%%a"
64 | Set /a Count+=1
65 | )
66 |
67 | If defined passwd (
68 | set passwd=!passwd:~1!
69 | echo [!Count!][!name!] ====^> "!passwd!"
70 | echo [!Count!][!name!] ====^> "!passwd!" >> "%PasswordLog%"
71 | ) else (
72 | Set /a Count+=1
73 | call :color 0C " [!Count!][!name!] The Password is empty" 1
74 | echo [!Count!][!name!] The Password is empty >> "%PasswordLog%"
75 | )
76 | exit /b
77 | ::*************************************************************************************
78 | :init
79 | prompt $g
80 | for /F "delims=." %%a in ('"prompt $H. & for %%b in (1) do rem"') do set "BS=%%a"
81 | exit /b
82 | ::*************************************************************************************
83 | :color
84 | set nL=%3
85 | if not defined nL echo requires third argument & pause > nul & goto :eof
86 | if %3 == 0 (
87 | %2 & findstr /v /a:%1 /r "^$" %2 nul & del %2 2>&1 & goto :eof
88 | ) else if %3 == 1 (
89 | echo %bs%>%2 & findstr /v /a:%1 /r "^$" %2 nul & del %2 2>&1 & goto :eof
90 | )
91 | exit /b
92 | ::*************************************************************************************
93 | :CountLines
94 | for /f "skip=2 delims=: tokens=2" %%a in ('netsh wlan show profiles') do (
95 | if not "%%a"=="" (
96 | set /a L+=1
97 | )
98 | )
99 | set /a L=!L! + 10
100 | Set Mod=Mode con cols=75 Lines=!L!
101 | exit /b
102 | ::*************************************************************************************
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Win10DisableLockscreen.bat:
--------------------------------------------------------------------------------
1 | :checkPrivileges
2 | NET FILE 1>NUL 2>NUL
3 | if '%errorlevel%' == '0' ( goto gotPrivileges ) else ( goto getPrivileges )
4 |
5 | :getPrivileges
6 | if '%1'=='ELEV' (echo ELEV & shift /1 & goto gotPrivileges)
7 |
8 | setlocal DisableDelayedExpansion
9 | set "batchPath=%~0"
10 | setlocal EnableDelayedExpansion
11 | ECHO Set UAC = CreateObject^("Shell.Application"^) > "%temp%\OEgetPrivileges.vbs"
12 | ECHO args = "ELEV " >> "%temp%\OEgetPrivileges.vbs"
13 | ECHO For Each strArg in WScript.Arguments >> "%temp%\OEgetPrivileges.vbs"
14 | ECHO args = args ^& strArg ^& " " >> "%temp%\OEgetPrivileges.vbs"
15 | ECHO Next >> "%temp%\OEgetPrivileges.vbs"
16 | ECHO UAC.ShellExecute "!batchPath!", args, "", "runas", 1 >> "%temp%\OEgetPrivileges.vbs"
17 | "%SystemRoot%\System32\WScript.exe" "%temp%\OEgetPrivileges.vbs" %*
18 | exit /B
19 |
20 | :gotPrivileges
21 | if '%1'=='ELEV' shift /1
22 | setlocal & pushd .
23 | cd /d %~dp0
24 |
25 | :Start
26 | for /f "delims= " %%a in ('"wmic useraccount where name='%username%' get sid"') do (
27 | if not "%%a"=="SID" (
28 | set myvar=%%a
29 | goto :loop_end
30 | )
31 | )
32 |
33 | :loop_end
34 | set "line01="
35 | set "line02="
36 | set "line03= "
37 | set "line04= 2016-08-06T12:40:47.6863074"
38 | set "line05= System"
39 | set "line06= \Disable Windows Lock Screen"
40 | set "line07= "
41 | set "line08= "
42 | set "line09= "
43 | set "line10= true"
44 | set "line11= "
45 | set "line12= "
46 | set "line13= true"
47 | set "line14= SessionUnlock"
48 | set "line15= "
49 | set "line16= "
50 | set "line17= "
51 | set "line18= "
52 | set "line19= %myvar%"
53 | set "line20= InteractiveToken"
54 | set "line21= HighestAvailable"
55 | set "line22= "
56 | set "line23= "
57 | set "line24= "
58 | set "line25= IgnoreNew"
59 | set "line26= false"
60 | set "line27= true"
61 | set "line28= true"
62 | set "line29= false"
63 | set "line30= false"
64 | set "line31= "
65 | set "line32= true"
66 | set "line33= false"
67 | set "line34= "
68 | set "line35= true"
69 | set "line36= true"
70 | set "line37= false"
71 | set "line38= false"
72 | set "line39= false"
73 | set "line40= true"
74 | set "line41= false"
75 | set "line42= PT72H"
76 | set "line43= 7"
77 | set "line44= "
78 | set "line45= "
79 | set "line46= "
80 | set "line47= reg"
81 | set "line48= add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\SessionData /t REG_DWORD /v AllowLockScreen /d 0 /f"
82 | set "line49= "
83 | set "line50= "
84 | set "line51="
85 |
86 | setlocal EnableDelayedExpansion
87 | (
88 | echo !line01!
89 | echo !line02!
90 | echo !line03!
91 | echo !line04!
92 | echo !line05!
93 | echo !line06!
94 | echo !line07!
95 | echo !line08!
96 | echo !line09!
97 | echo !line10!
98 | echo !line11!
99 | echo !line12!
100 | echo !line13!
101 | echo !line14!
102 | echo !line15!
103 | echo !line16!
104 | echo !line17!
105 | echo !line18!
106 | echo !line19!
107 | echo !line20!
108 | echo !line21!
109 | echo !line22!
110 | echo !line23!
111 | echo !line24!
112 | echo !line25!
113 | echo !line26!
114 | echo !line27!
115 | echo !line28!
116 | echo !line29!
117 | echo !line30!
118 | echo !line31!
119 | echo !line32!
120 | echo !line33!
121 | echo !line34!
122 | echo !line35!
123 | echo !line36!
124 | echo !line37!
125 | echo !line38!
126 | echo !line39!
127 | echo !line40!
128 | echo !line41!
129 | echo !line42!
130 | echo !line43!
131 | echo !line44!
132 | echo !line45!
133 | echo !line46!
134 | echo !line47!
135 | echo !line48!
136 | echo !line49!
137 | echo !line50!
138 | echo !line51!
139 |
140 | ) > "Win 10 Lockscreen deaktivieren.xml"
141 | schtasks /create /tn "Disable Windows Lock Screen" /xml "%~dp0Win 10 Lockscreen deaktivieren.xml"
142 | del /F /Q "%~dp0Win 10 Lockscreen deaktivieren.xml"
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Windows 10 - Active Numlock au démarrage.reg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/Windows 10 - Active Numlock au démarrage.reg
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/Windows 10 - Désactive Numlock au démarrage.reg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/Windows 10 - Désactive Numlock au démarrage.reg
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/WindowsInfoLicense.vbs:
--------------------------------------------------------------------------------
1 | On Error Resume Next
2 | ' ##############################################################
3 | ' # #
4 | ' # VBScript to find the DigitalProductID for your #
5 | ' # Microsoft windows Installation and decode it to #
6 | ' # retrieve your windows Product Key #
7 | ' # #
8 | ' # ----------------------------------------------- #
9 | ' # #
10 | ' # Created by: Parabellum #
11 | ' # #
12 | ' ##############################################################
13 | '
14 | ' <--------------- Open Registry Key and populate binary data into an array -------------------------->
15 | '
16 | const HKEY_LOCAL_MACHINE = &H80000002
17 | strKeyPath = "SOFTWARE\Microsoft\Windows NT\CurrentVersion"
18 | strValueName = "DigitalProductId"
19 | strComputer = "."
20 | dim iValues()
21 | Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" & _
22 | strComputer & "\root\default:StdRegProv")
23 | oReg.GetBinaryValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,iValues
24 | Dim arrDPID
25 | arrDPID = Array()
26 | For i = 52 to 66
27 | ReDim Preserve arrDPID( UBound(arrDPID) + 1 )
28 | arrDPID( UBound(arrDPID) ) = iValues(i)
29 | Next
30 | ' <--------------- Create an array to hold the valid characters for a microsoft Product Key -------------------------->
31 | Dim arrChars
32 | arrChars = Array("B","C","D","F","G","H","J","K","M","P","Q","R","T","V","W","X","Y","2","3","4","6","7","8","9")
33 |
34 | ' <--------------- The clever bit !!! (Decrypt the base24 encoded binary data)-------------------------->
35 | For i = 24 To 0 Step -1
36 | k = 0
37 | For j = 14 To 0 Step -1
38 | k = k * 256 Xor arrDPID(j)
39 | arrDPID(j) = Int(k / 24)
40 | k = k Mod 24
41 | Next
42 | strProductKey = arrChars(k) & strProductKey
43 | ' <------- add the "-" between the groups of 5 Char -------->
44 | If i Mod 5 = 0 And i <> 0 Then strProductKey = "-" & strProductKey
45 | Next
46 | strFinalKey = strProductKey
47 | '
48 | ' <---------- This part of the script displays operating system Information and the license Key --------->
49 | '
50 | strComputer = "."
51 | Set objWMIService = GetObject("winmgmts:" _
52 | & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")
53 | Set colOperatingSystems = objWMIService.ExecQuery _
54 | ("Select * from Win32_OperatingSystem")
55 | For Each objOperatingSystem in colOperatingSystems
56 | strOS = objOperatingSystem.Caption
57 | strBuild = objOperatingSystem.BuildNumber
58 | strSerial = objOperatingSystem.SerialNumber
59 | strRegistered = objOperatingSystem.RegisteredUser
60 | Next
61 | Set wshShell=CreateObject("wscript.shell")
62 | strPopupMsg = strOS & vbNewLine & vbNewLine
63 | strPopupMsg = strPopupMsg & "Build Number: " & strBuild & vbNewLine
64 | strPopupMsg = strPopupMsg & "PID: " & strSerial & vbNewLine & vbNewLine
65 | strPopupMsg = strPopupMsg & "Registered to: " & strRegistered & vbNewLine & vbNewLine & vbNewLine
66 | strPopupMsg = strPopupMsg & "Your Windows Product Key is:" & vbNewLine & vbNewLine & strFinalKey
67 | strPopupTitle = "Microsoft Windows License Information"
68 | wshShell.Popup strPopupMsg,,strPopupTitle,vbCancelOnly+vbinformation
69 |
70 |
71 | Const ForReading = 1, ForWriting = 2
72 | Set WshShell = WScript.CreateObject("WScript.Shell")
73 | Dim fso, f
74 | Set fso = CreateObject("Scripting.FileSystemObject")
75 | Set f = fso.OpenTextFile("C:\ProgramData\ABOAT\UnlockSoftwares\WindowsInfoLicense.txt", ForWriting,true)
76 | f.write(strPopupMsg)
77 | f.close
78 |
79 |
80 | Command = "cmd /C chcp 28591 > nul & cscript //nologo %systemroot%\System32\slmgr.vbs /dli >> C:\ProgramData\ABOAT\UnlockSoftwares\WindowsInfoLicense.txt & cscript //nologo %systemroot%\System32\slmgr.vbs /xpr >> C:\ProgramData\ABOAT\UnlockSoftwares\WindowsInfoLicense.txt"
81 | wshShell.Run Command,0,True
82 |
83 |
84 | WshShell.Run "C:\ProgramData\ABOAT\UnlockSoftwares\WindowsInfoLicense.txt"
85 |
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/WindowsRaccourci.rar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/WindowsRaccourci.rar
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/[Crack]Liste de clés d'activation.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/[Crack]Liste de clés d'activation.txt
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/activate-office-2016.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | color 0A
3 | Mode con cols=70 lines=5
4 | Title Automatically check and get admin rights
5 | :::::::::::::::::::::::::::::::::::::::::
6 | :: Automatically check and get admin rights
7 | :::::::::::::::::::::::::::::::::::::::::
8 | Set TmpLogFile=TmpLogkey.txt
9 | Set LogFile=Startup_key_Log.txt
10 | If Exist %TmpLogFile% Del %TmpLogFile%
11 | If Exist %LogFile% Del %LogFile%
12 | REM --> Check for permissions
13 | Reg query "HKU\S-1-5-19\Environment" >%TmpLogFile% 2>&1
14 | REM --> If error flag set, we do not have admin.
15 | if '%errorlevel%' NEQ '0' (
16 | Echo.
17 | ECHO **************************************
18 | ECHO Running Admin shell... Please wait...
19 | ECHO **************************************
20 |
21 | goto UACPrompt
22 | ) else ( goto gotAdmin )
23 |
24 | :UACPrompt
25 | echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs"
26 | set params = %*:"=""
27 | echo UAC.ShellExecute "cmd.exe", "/c ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs"
28 |
29 | "%temp%\getadmin.vbs"
30 | del "%temp%\getadmin.vbs"
31 | exit /B
32 |
33 | :gotAdmin
34 |
35 | ::::::::::::::::::::::::::::
36 | ::START
37 | ::::::::::::::::::::::::::::
38 | REM start code here
39 | chcp 28591 > nul
40 | @echo off
41 | title Activate Microsoft Office 2016 ALL versions for FREE!&cls&echo ============================================================================&echo #Project: Activating Microsoft software products for FREE without software&echo ============================================================================&echo.&echo #Supported products:&echo - Microsoft Office Standard 2016&echo - Microsoft Office Professional Plus 2016&echo.&echo.&(if exist "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" cd /d "%ProgramFiles%\Microsoft Office\Office16")&(if exist "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" cd /d "%ProgramFiles(x86)%\Microsoft Office\Office16")&(for /f %%x in ('dir /b ..\root\Licenses16\proplusvl_kms*.xrm-ms') do cscript ospp.vbs /inslic:"..\root\Licenses16\%%x" >nul)&(for /f %%x in ('dir /b ..\root\Licenses16\proplusvl_mak*.xrm-ms') do cscript ospp.vbs /inslic:"..\root\Licenses16\%%x" >nul)&echo.&echo ============================================================================&echo Activating your Office...&cscript //nologo ospp.vbs /unpkey:WFG99 >nul&cscript //nologo ospp.vbs /unpkey:DRTFM >nul&cscript //nologo ospp.vbs /unpkey:BTDRB >nul&cscript //nologo ospp.vbs /inpkey:XQNVK-8JYDB-WJ9W3-YJ8YR-WFG99 >nul&set i=1
42 | :server
43 | if %i%==1 set KMS_Sev=kms7.MSGuides.com
44 | if %i%==2 set KMS_Sev=kms8.MSGuides.com
45 | if %i%==3 set KMS_Sev=kms9.MSGuides.com
46 | if %i%==4 goto notsupported
47 | cscript //nologo ospp.vbs /sethst:%KMS_Sev% >nul&echo ============================================================================&echo.&echo.
48 | cscript //nologo ospp.vbs /act | find /i "successful" && (echo.&echo ============================================================================&echo.&echo #My official blog: MSGuides.com&echo.&echo #How it works: bit.ly/kms-server&echo.&echo #Please feel free to contact me at msguides.com@gmail.com if you have any questions or concerns.&echo.&echo #Please consider supporting this project: donate.msguides.com&echo #Your support is helping me keep my servers running everyday!&echo.&echo ============================================================================&choice /n /c YN /m "Would you like to visit my blog [Y,N]?" & if errorlevel 2 exit) || (echo The connection to my KMS server failed! Trying to connect to another one... & echo Please wait... & echo. & echo. & set /a i+=1 & goto server)
49 | explorer "http://MSGuides.com"&goto halt
50 | :notsupported
51 | echo.&echo ============================================================================&echo Sorry! Your version is not supported.&echo Please try installing the latest version here: bit.ly/downloadmsp
52 | :halt
53 | pause
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/activate-office-2019.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | color 0A
3 | Mode con cols=70 lines=5
4 | Title Automatically check and get admin rights
5 |
6 | :: Automatically check and get admin rights
7 | :::::::::::::::::::::::::::::::::::::::::
8 | Set TmpLogFile=TmpLogkey.txt
9 | Set LogFile=Startup_key_Log.txt
10 | If Exist %TmpLogFile% Del %TmpLogFile%
11 | If Exist %LogFile% Del %LogFile%
12 | REM --> Check for permissions
13 | Reg query "HKU\S-1-5-19\Environment" >%TmpLogFile% 2>&1
14 | REM --> If error flag set, we do not have admin.
15 | if '%errorlevel%' NEQ '0' (
16 | Echo.
17 | ECHO **************************************
18 | ECHO Running Admin shell... Please wait...
19 | ECHO **************************************
20 |
21 | goto UACPrompt
22 | ) else ( goto gotAdmin )
23 |
24 | :UACPrompt
25 | echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs"
26 | set params = %*:"=""
27 | echo UAC.ShellExecute "cmd.exe", "/c ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs"
28 |
29 | "%temp%\getadmin.vbs"
30 | del "%temp%\getadmin.vbs"
31 | exit /B
32 |
33 | :gotAdmin
34 |
35 | ::::::::::::::::::::::::::::
36 | ::START
37 | ::::::::::::::::::::::::::::
38 | REM start code here
39 |
40 | chcp 28591 > nul
41 | @echo off
42 | title Activate Microsoft Office 2019 ALL versions for FREE!&cls&echo ============================================================================&echo #Project: Activating Microsoft software products for FREE without software&echo ============================================================================&echo.&echo #Supported products:&echo - Microsoft Office Standard 2019&echo - Microsoft Office Professional Plus 2019&echo.&echo.&(if exist "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" cd /d "%ProgramFiles%\Microsoft Office\Office16")&(if exist "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" cd /d "%ProgramFiles(x86)%\Microsoft Office\Office16")&(for /f %%x in ('dir /b ..\root\Licenses16\ProPlus2019VL*.xrm-ms') do cscript ospp.vbs /inslic:"..\root\Licenses16\%%x" >nul)&(for /f %%x in ('dir /b ..\root\Licenses16\ProPlus2019VL*.xrm-ms') do cscript ospp.vbs /inslic:"..\root\Licenses16\%%x" >nul)&echo.&echo ============================================================================&echo Activating your Office...&cscript //nologo slmgr.vbs /ckms >nul&cscript //nologo ospp.vbs /setprt:1688 >nul&cscript //nologo ospp.vbs /unpkey:6MWKP >nul&cscript //nologo ospp.vbs /inpkey:NMMKJ-6RK4F-KMJVX-8D9MJ-6MWKP >nul&set i=1
43 | :server
44 | if %i%==1 set KMS_Sev=kms7.MSGuides.com
45 | if %i%==2 set KMS_Sev=kms8.MSGuides.com
46 | if %i%==3 set KMS_Sev=kms9.MSGuides.com
47 | if %i%==4 goto notsupported
48 | cscript //nologo ospp.vbs /sethst:%KMS_Sev% >nul&echo ============================================================================&echo.&echo.
49 | cscript //nologo ospp.vbs /act | find /i "successful" && (echo.&echo ============================================================================&echo.&echo #My official blog: MSGuides.com&echo.&echo #How it works: bit.ly/kms-server&echo.&echo #Please feel free to contact me at msguides.com@gmail.com if you have any questions or concerns.&echo.&echo #Please consider supporting this project: donate.msguides.com&echo #Your support is helping me keep my servers running everyday!&echo.&echo ============================================================================&choice /n /c YN /m "Would you like to visit my blog [Y,N]?" & if errorlevel 2 exit) || (echo The connection to my KMS server failed! Trying to connect to another one... & echo Please wait... & echo. & echo. & set /a i+=1 & goto server)
50 | explorer "http://MSGuides.com"&goto halt
51 | :notsupported
52 | echo.&echo ============================================================================&echo Sorry! Your version is not supported.&echo Please try installing the latest version here: bit.ly/aiomsp
53 | :halt
54 | pause >nul
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/activate-visio2016.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | color 0A
3 | Mode con cols=70 lines=5
4 | Title Automatically check and get admin rights
5 | :::::::::::::::::::::::::::::::::::::::::
6 | :: Automatically check and get admin rights
7 | :::::::::::::::::::::::::::::::::::::::::
8 | Set TmpLogFile=TmpLogkey.txt
9 | Set LogFile=Startup_key_Log.txt
10 | If Exist %TmpLogFile% Del %TmpLogFile%
11 | If Exist %LogFile% Del %LogFile%
12 | REM --> Check for permissions
13 | Reg query "HKU\S-1-5-19\Environment" >%TmpLogFile% 2>&1
14 | REM --> If error flag set, we do not have admin.
15 | if '%errorlevel%' NEQ '0' (
16 | Echo.
17 | ECHO **************************************
18 | ECHO Running Admin shell... Please wait...
19 | ECHO **************************************
20 |
21 | goto UACPrompt
22 | ) else ( goto gotAdmin )
23 |
24 | :UACPrompt
25 | echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs"
26 | set params = %*:"=""
27 | echo UAC.ShellExecute "cmd.exe", "/c ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs"
28 |
29 | "%temp%\getadmin.vbs"
30 | del "%temp%\getadmin.vbs"
31 | exit /B
32 |
33 | :gotAdmin
34 |
35 | ::::::::::::::::::::::::::::
36 | ::START
37 | ::::::::::::::::::::::::::::
38 | REM start code here
39 | chcp 28591 > nul
40 | title Activate Microsoft Visio 2016 ALL versions for FREE!&cls&echo ============================================================================&echo #Project: Activating Microsoft software products for FREE without software&echo ============================================================================&echo.&echo #Supported products:&echo - Microsoft Visio Standard 2016&echo - Microsoft Visio Professional Plus 2016&echo.&echo.&(if exist "%ProgramFiles%\Microsoft Office\Office16\ospp.vbs" cd /d "%ProgramFiles%\Microsoft Office\Office16")&(if exist "%ProgramFiles(x86)%\Microsoft Office\Office16\ospp.vbs" cd /d "%ProgramFiles(x86)%\Microsoft Office\Office16")&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\VisioProVL_KMS_Client-ppd.xrm-ms" >nul&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\VisioProVL_KMS_Client-ul-oob.xrm-ms" >nul&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\VisioProVL_KMS_Client-ul.xrm-ms" >nul&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\client-issuance-bridge-office.xrm-ms" >nul&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\client-issuance-root.xrm-ms" >nul&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\client-issuance-root-bridge-test.xrm-ms" >nul&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\client-issuance-stil.xrm-ms" >nul&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\client-issuance-ul.xrm-ms" >nul&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\client-issuance-ul-oob.xrm-ms" >nul&cscript //nologo ospp.vbs /inslic:"..\root\Licenses16\pkeyconfig-office.xrm-ms" >nul&echo.&echo ============================================================================&echo Activating your Visio...&cscript //nologo ospp.vbs /unpkey:W8GF4 >nul&cscript //nologo ospp.vbs /unpkey:RJRJK >nul&cscript //nologo ospp.vbs /inpkey:PD3PC-RHNGV-FXJ29-8JK7D-RJRJK >nul&set i=1
41 | :server
42 | if %i%==1 set KMS_Sev=kms7.MSGuides.com
43 | if %i%==2 set KMS_Sev=kms8.MSGuides.com
44 | if %i%==3 set KMS_Sev=kms9.MSGuides.com
45 | if %i%==4 goto notsupported
46 | cscript //nologo ospp.vbs /sethst:%KMS_Sev% >nul&echo ============================================================================&echo.&echo.
47 | cscript //nologo ospp.vbs /act | find /i "successful" && (echo.&echo ============================================================================&echo.&echo #My official blog: MSGuides.com&echo.&echo #How it works: bit.ly/kms-server&echo.&echo #Please feel free to contact me at msguides.com@gmail.com if you have any questions or concerns.&echo.&echo #Please consider supporting this project: donate.msguides.com&echo #Your support is helping me keep my servers running everyday!&echo.&echo ============================================================================&choice /n /c YN /m "Would you like to visit my blog [Y,N]?" & if errorlevel 2 exit) || (echo The connection to my KMS server failed! Trying to connect to another one... & echo Please wait... & echo. & echo. & set /a i+=1 & goto server)
48 | explorer "http://MSGuides.com"&goto halt
49 | :notsupported
50 | echo.&echo ============================================================================&echo Sorry! Your version is not supported.&echo Please try installing the latest version here: bit.ly/downloadmsp
51 | :halt
52 | pause
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/activate-windows-10.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | color 0A
3 | Mode con cols=70 lines=5
4 | Title Automatically check and get admin rights
5 | :::::::::::::::::::::::::::::::::::::::::
6 | :: Automatically check and get admin rights
7 | :::::::::::::::::::::::::::::::::::::::::
8 | Set TmpLogFile=TmpLogkey.txt
9 | Set LogFile=Startup_key_Log.txt
10 | If Exist %TmpLogFile% Del %TmpLogFile%
11 | If Exist %LogFile% Del %LogFile%
12 | REM --> Check for permissions
13 | Reg query "HKU\S-1-5-19\Environment" >%TmpLogFile% 2>&1
14 | REM --> If error flag set, we do not have admin.
15 | if '%errorlevel%' NEQ '0' (
16 | Echo.
17 | ECHO **************************************
18 | ECHO Running Admin shell... Please wait...
19 | ECHO **************************************
20 |
21 | goto UACPrompt
22 | ) else ( goto gotAdmin )
23 |
24 | :UACPrompt
25 | echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs"
26 | set params = %*:"=""
27 | echo UAC.ShellExecute "cmd.exe", "/c ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs"
28 |
29 | "%temp%\getadmin.vbs"
30 | del "%temp%\getadmin.vbs"
31 | exit /B
32 |
33 | :gotAdmin
34 |
35 | ::::::::::::::::::::::::::::
36 | ::START
37 | ::::::::::::::::::::::::::::
38 | REM start code here
39 | chcp 28591 > nul
40 | @echo off
41 | title Activate Windows 10 ALL versions for FREE!&cls&echo ============================================================================&echo #Project: Activating Microsoft software products for FREE without software&echo ============================================================================&echo.&echo #Supported products:&echo - Windows 10 Home&echo - Windows 10 Home N&echo - Windows 10 Home Single Language&echo - Windows 10 Home Country Specific&echo - Windows 10 Professional&echo - Windows 10 Professional N&echo - Windows 10 Education&echo - Windows 10 Education N&echo - Windows 10 Enterprise&echo - Windows 10 Enterprise N&echo - Windows 10 Enterprise LTSB&echo - Windows 10 Enterprise LTSB N&echo.&echo.&echo ============================================================================&echo Activating your Windows...&cscript //nologo slmgr.vbs /ckms >nul&cscript //nologo slmgr.vbs /upk >nul&cscript //nologo slmgr.vbs /cpky >nul&set i=1&wmic os | findstr /I "enterprise" >nul
42 | if %errorlevel% EQU 0 (cscript //nologo slmgr.vbs /ipk NPPR9-FWDCX-D2C8J-H872K-2YT43 >nul&cscript //nologo slmgr.vbs /ipk DPH2V-TTNVB-4X9Q3-TJR4H-KHJW4 >nul&cscript //nologo slmgr.vbs /ipk WNMTR-4C88C-JK8YV-HQ7T2-76DF9 >nul&cscript //nologo slmgr.vbs /ipk 2F77B-TNFGY-69QQF-B8YKP-D69TJ >nul&cscript //nologo slmgr.vbs /ipk DCPHK-NFMTC-H88MJ-PFHPY-QJ4BJ >nul&cscript //nologo slmgr.vbs /ipk QFFDN-GRT3P-VKWWX-X7T3R-8B639 >nul&goto server) else wmic os | findstr /I "home" >nul
43 | if %errorlevel% EQU 0 (cscript //nologo slmgr.vbs /ipk TX9XD-98N7V-6WMQ6-BX7FG-H8Q99 >nul&cscript //nologo slmgr.vbs /ipk 3KHY7-WNT83-DGQKR-F7HPR-844BM >nul&cscript //nologo slmgr.vbs /ipk 7HNRX-D7KGG-3K4RQ-4WPJ4-YTDFH >nul&cscript //nologo slmgr.vbs /ipk PVMJN-6DFY6-9CCP6-7BKTT-D3WVR >nul&goto server) else wmic os | findstr /I "education" >nul
44 | if %errorlevel% EQU 0 (cscript //nologo slmgr.vbs /ipk NW6C2-QMPVW-D7KKK-3GKT6-VCFB2 >nul&cscript //nologo slmgr.vbs /ipk 2WH4N-8QGBV-H22JP-CT43Q-MDWWJ >nul&goto server) else wmic os | findstr /I "10 pro" >nul
45 | if %errorlevel% EQU 0 (cscript //nologo slmgr.vbs /ipk W269N-WFGWX-YVC9B-4J6C9-T83GX >nul&cscript //nologo slmgr.vbs /ipk MH37W-N47XK-V7XM9-C7227-GCQG9 >nul&goto server) else (goto notsupported)
46 | :server
47 | if %i%==1 set KMS_Sev=kms7.MSGuides.com
48 | if %i%==2 set KMS_Sev=kms8.MSGuides.com
49 | if %i%==3 set KMS_Sev=kms9.MSGuides.com
50 | if %i%==4 goto notsupported
51 | cscript //nologo slmgr.vbs /skms %KMS_Sev%:1688 >nul&echo ============================================================================&echo.&echo.
52 | cscript //nologo slmgr.vbs /ato | find /i "successfully" && (echo.&echo ============================================================================&echo.&echo #My official blog: MSGuides.com&echo.&echo #How it works: bit.ly/kms-server&echo.&echo #Please feel free to contact me at msguides.com@gmail.com if you have any questions or concerns.&echo.&echo #Please consider supporting this project: donate.msguides.com&echo #Your support is helping me keep my servers running everyday!&echo.&echo ============================================================================&choice /n /c YN /m "Would you like to visit my blog [Y,N]?" & if errorlevel 2 exit) || (echo The connection to my KMS server failed! Trying to connect to another one... & echo Please wait... & echo. & echo. & set /a i+=1 & goto server)
53 | explorer "http://MSGuides.com"&goto halt
54 | :notsupported
55 | echo ============================================================================&echo.&echo Sorry! Your version is not supported.&echo.
56 | :halt
57 | pause >nul
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/activate-windows-8-8-1.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | color 0A
3 | Mode con cols=70 lines=5
4 | Title Automatically check and get admin rights
5 | :::::::::::::::::::::::::::::::::::::::::
6 | :: Automatically check and get admin rights
7 | :::::::::::::::::::::::::::::::::::::::::
8 | Set TmpLogFile=TmpLogkey.txt
9 | Set LogFile=Startup_key_Log.txt
10 | If Exist %TmpLogFile% Del %TmpLogFile%
11 | If Exist %LogFile% Del %LogFile%
12 | REM --> Check for permissions
13 | Reg query "HKU\S-1-5-19\Environment" >%TmpLogFile% 2>&1
14 | REM --> If error flag set, we do not have admin.
15 | if '%errorlevel%' NEQ '0' (
16 | Echo.
17 | ECHO **************************************
18 | ECHO Running Admin shell... Please wait...
19 | ECHO **************************************
20 |
21 | goto UACPrompt
22 | ) else ( goto gotAdmin )
23 |
24 | :UACPrompt
25 | echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs"
26 | set params = %*:"=""
27 | echo UAC.ShellExecute "cmd.exe", "/c ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs"
28 |
29 | "%temp%\getadmin.vbs"
30 | del "%temp%\getadmin.vbs"
31 | exit /B
32 |
33 | :gotAdmin
34 |
35 | ::::::::::::::::::::::::::::
36 | ::START
37 | ::::::::::::::::::::::::::::
38 | REM start code here
39 | chcp 28591 > nul
40 | title Activate Windows 8 / Windows 8.1 ALL versions for FREE!&cls&echo ============================================================================&echo #Project: Activating Microsoft software products for FREE without software&echo ============================================================================&echo.&echo #Supported products:&echo - Windows 8 Core&echo - Windows 8 Core Single Language&echo - Windows 8 Professional&echo - Windows 8 Professional N&echo - Windows 8 Professional WMC&echo - Windows 8 Enterprise&echo - Windows 8 Enterprise N&echo - Windows 8.1 Core&echo - Windows 8.1 Core N&echo - Windows 8.1 Core Single Language&echo - Windows 8.1 Professional&echo - Windows 8.1 Professional N&echo - Windows 8.1 Professional WMC&echo - Windows 8.1 Enterprise&echo - Windows 8.1 Enterprise N&echo.&echo.&echo ============================================================================&echo Activating your Windows...&cscript //nologo slmgr.vbs /upk >nul&cscript //nologo slmgr.vbs /cpky >nul&wmic os | findstr /I "enterprise" >nul
41 | if %errorlevel% EQU 0 (cscript //nologo slmgr.vbs /ipk MHF9N-XY6XB-WVXMC-BTDCT-MKKG7 >nul&cscript //nologo slmgr.vbs /ipk TT4HM-HN7YT-62K67-RGRQJ-JFFXW >nul&cscript //nologo slmgr.vbs /ipk 32JNW-9KQ84-P47T8-D8GGY-CWCK7 >nul&cscript //nologo slmgr.vbs /ipk JMNMF-RHW7P-DMY6X-RF3DR-X2BQT >nul) else (cscript //nologo slmgr.vbs /ipk GCRJD-8NW9H-F2CDX-CCM8D-9D6T9 >nul&cscript //nologo slmgr.vbs /ipk HMCNV-VVBFX-7HMBH-CTY9B-B4FXY >nul&cscript //nologo slmgr.vbs /ipk NG4HW-VH26C-733KW-K6F98-J8CK4 >nul&cscript //nologo slmgr.vbs /ipk XCVCF-2NXM9-723PB-MHCB7-2RYQQ >nul&cscript //nologo slmgr.vbs /ipk BN3D2-R7TKB-3YPBD-8DRP2-27GG4 >nul&cscript //nologo slmgr.vbs /ipk 2WN2H-YGCQR-KFX6K-CD6TF-84YXQ >nul&cscript //nologo slmgr.vbs /ipk GNBB8-YVD74-QJHX6-27H4K-8QHDG >nul&cscript //nologo slmgr.vbs /ipk M9Q9P-WNJJT-6PXPY-DWX8H-6XWKK >nul&cscript //nologo slmgr.vbs /ipk 7B9N3-D94CG-YTVHR-QBPX3-RJP64 >nul&cscript //nologo slmgr.vbs /ipk BB6NG-PQ82V-VRDPW-8XVD2-V8P66 >nul&cscript //nologo slmgr.vbs /ipk 789NJ-TQK6T-6XTH8-J39CJ-J8D3P >nul)
42 | set i=1
43 | :server
44 | if %i%==1 set KMS_Sev=kms7.MSGuides.com
45 | if %i%==2 set KMS_Sev=kms8.MSGuides.com
46 | if %i%==3 set KMS_Sev=kms9.MSGuides.com
47 | if %i%==4 goto notsupported
48 | cscript //nologo slmgr.vbs /skms %KMS_Sev% >nul&echo ============================================================================&echo.&echo.
49 | cscript //nologo slmgr.vbs /ato | find /i "successfully" && (echo.&echo ============================================================================&echo.&echo #My official blog: MSGuides.com&echo.&echo #How it works: bit.ly/kms-server&echo.&echo #Please feel free to contact me at msguides.com@gmail.com if you have any questions or concerns.&echo.&echo #Please consider supporting this project: donate.msguides.com&echo #Your support is helping me keep my servers running everyday!&echo.&echo ============================================================================&choice /n /c YN /m "Would you like to visit my blog [Y,N]?" & if errorlevel 2 exit) || (echo The connection to my KMS server failed! Trying to connect to another one... & echo Please wait... & echo. & echo. & set /a i+=1 & goto server)
50 | goto halt
51 | :notsupported
52 | echo ============================================================================&echo.&echo Sorry! Your version is not supported.
53 | :halt
54 | pause
--------------------------------------------------------------------------------
/UnlockSoftwares/Resources/revouninstallerpro4.lic:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/Resources/revouninstallerpro4.lic
--------------------------------------------------------------------------------
/UnlockSoftwares/UnlockSoftwares.vbproj:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 | Debug
6 | AnyCPU
7 | {0D6940ED-85D7-4B45-895D-F3F12021D463}
8 | WinExe
9 | UnlockSoftwares.My.MyApplication
10 | UnlockSoftwares
11 | UnlockSoftwares
12 | 512
13 | WindowsForms
14 | v4.5
15 | false
16 | D:\UnlockSofwares\
17 | true
18 | Disk
19 | false
20 | Foreground
21 | 7
22 | Days
23 | false
24 | false
25 | true
26 | 2
27 | 1.0.0.%2a
28 | false
29 | true
30 | true
31 |
32 |
33 | AnyCPU
34 | true
35 | full
36 | true
37 | true
38 | bin\Debug\
39 | UnlockSoftwares.xml
40 | 42016,41999,42017,42018,42019,42032,42036,42020,42021,42022
41 |
42 |
43 | AnyCPU
44 | pdbonly
45 | false
46 | true
47 | true
48 | bin\Release\
49 | UnlockSoftwares.xml
50 | 42016,41999,42017,42018,42019,42032,42036,42020,42021,42022
51 |
52 |
53 | On
54 |
55 |
56 | Binary
57 |
58 |
59 | Off
60 |
61 |
62 | On
63 |
64 |
65 | 207787.ico
66 |
67 |
68 | My Project\app.manifest
69 |
70 |
71 | 6FF7E0B391C9F8324C85D9EFFD41BF2C171D0BF6
72 |
73 |
74 | UnlockSoftwares_TemporaryKey.pfx
75 |
76 |
77 | true
78 |
79 |
80 | false
81 |
82 |
83 | LocalIntranet
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 |
94 |
95 |
96 |
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 |
106 |
107 |
108 |
109 |
110 |
111 |
112 |
113 |
114 | Form
115 |
116 |
117 | Form1.vb
118 | Form
119 |
120 |
121 |
122 | True
123 | Application.myapp
124 |
125 |
126 | True
127 | True
128 | Resources.resx
129 |
130 |
131 | True
132 | Settings.settings
133 | True
134 |
135 |
136 |
137 |
138 | Form1.vb
139 |
140 |
141 | VbMyResourcesResXFileCodeGenerator
142 | My.Resources
143 | Designer
144 | Resources.Designer.vb
145 |
146 |
147 |
148 |
149 |
150 | MyApplicationCodeGenerator
151 | Application.Designer.vb
152 |
153 |
154 | SettingsSingleFileGenerator
155 | My
156 | Settings.Designer.vb
157 |
158 |
159 |
160 |
161 |
162 |
163 |
164 |
165 |
166 |
167 |
168 |
169 |
170 |
171 |
172 |
173 |
174 |
175 |
176 |
177 |
178 |
179 |
180 |
181 |
182 |
183 |
184 |
185 |
186 |
187 |
188 |
189 |
190 |
191 |
192 |
193 |
194 |
195 |
196 |
197 |
198 |
199 |
200 |
201 |
202 |
203 |
204 |
205 |
206 |
207 |
208 |
209 |
210 |
211 |
212 |
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
226 |
227 |
228 |
229 |
230 |
231 |
232 | False
233 | .NET Framework 3.5 SP1
234 | false
235 |
236 |
237 |
238 |
--------------------------------------------------------------------------------
/UnlockSoftwares/UnlockSoftwares.vbproj.user:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 | D:\UnlockSofwares\|publish\
5 |
6 |
7 |
8 |
9 |
10 | fr-FR
11 | false
12 | ShowAllFiles
13 |
14 |
15 | false
16 |
17 |
--------------------------------------------------------------------------------
/UnlockSoftwares/UnlockSoftwares_TemporaryKey.pfx:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/UnlockSoftwares_TemporaryKey.pfx
--------------------------------------------------------------------------------
/UnlockSoftwares/bin/Debug/UnlockSoftwares.application:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 | 1sjXxUKpFgnq+f+L383CKomhwQzT178F3LMzR4VKaWQ=
18 |
19 |
20 |
21 |
--------------------------------------------------------------------------------
/UnlockSoftwares/bin/Debug/UnlockSoftwares.exe:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/bin/Debug/UnlockSoftwares.exe
--------------------------------------------------------------------------------
/UnlockSoftwares/bin/Debug/UnlockSoftwares.exe.config:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 | 2085-01-01
18 |
19 |
20 | 20
21 |
22 |
23 |
24 |
--------------------------------------------------------------------------------
/UnlockSoftwares/bin/Debug/UnlockSoftwares.exe.manifest:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 | nAuJ6J4juBbxvb6NSpOBE0eyWfLD3BOaGy7BFXQgQWg=
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 | CbwKk7wU/zi5Avmu2QzC90PPih1iTsPbDSNSbWiupC8=
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 | G6FZrsj9+d0ZoaU1ZeaSYVB8VvMhN80j4mAah+LCQL4=
73 |
74 |
75 |
76 |
77 |
80 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
--------------------------------------------------------------------------------
/UnlockSoftwares/bin/Debug/UnlockSoftwares.pdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/bin/Debug/UnlockSoftwares.pdb
--------------------------------------------------------------------------------
/UnlockSoftwares/bin/Debug/app.publish/UnlockSoftwares.exe:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/bin/Debug/app.publish/UnlockSoftwares.exe
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/CoreCompileInputs.cache:
--------------------------------------------------------------------------------
1 | 113e08be887be544c1f0d652941c592b35f8c808
2 |
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/DesignTimeResolveAssemblyReferences.cache:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/obj/Debug/DesignTimeResolveAssemblyReferences.cache
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/DesignTimeResolveAssemblyReferencesInput.cache:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/obj/Debug/DesignTimeResolveAssemblyReferencesInput.cache
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/TempPE/My Project.Resources.Designer.vb.dll:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/obj/Debug/TempPE/My Project.Resources.Designer.vb.dll
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.Form1.resources:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/obj/Debug/UnlockSoftwares.Form1.resources
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.Resources.resources:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/obj/Debug/UnlockSoftwares.Resources.resources
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.TrustInfo.xml:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.application:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 | 1sjXxUKpFgnq+f+L383CKomhwQzT178F3LMzR4VKaWQ=
18 |
19 |
20 |
21 |
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.exe:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/obj/Debug/UnlockSoftwares.exe
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.exe.manifest:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 | nAuJ6J4juBbxvb6NSpOBE0eyWfLD3BOaGy7BFXQgQWg=
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 | CbwKk7wU/zi5Avmu2QzC90PPih1iTsPbDSNSbWiupC8=
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 | G6FZrsj9+d0ZoaU1ZeaSYVB8VvMhN80j4mAah+LCQL4=
73 |
74 |
75 |
76 |
77 |
80 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.pdb:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/obj/Debug/UnlockSoftwares.pdb
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.vbproj.FileListAbsolute.txt:
--------------------------------------------------------------------------------
1 | D:\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.exe.config
2 | D:\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.exe.manifest
3 | D:\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.application
4 | D:\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.exe
5 | D:\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.pdb
6 | D:\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.xml
7 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.Form1.resources
8 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.Resources.resources
9 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.vbproj.GenerateResource.Cache
10 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.exe.manifest
11 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.application
12 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.exe
13 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.xml
14 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.pdb
15 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.vbproj.CoreCompileInputs.cache
16 | D:\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.vbprojAssemblyReference.cache
17 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.Form1.resources
18 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.Resources.resources
19 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.vbproj.GenerateResource.cache
20 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.exe
21 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.xml
22 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.pdb
23 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.exe.config
24 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.exe
25 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.pdb
26 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.xml
27 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.vbprojAssemblyReference.cache
28 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.exe.manifest
29 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\bin\Debug\UnlockSoftwares.application
30 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.TrustInfo.xml
31 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.exe.manifest
32 | D:\DEV\Documents\Projets\UnlockSoftwares\UnlockSoftwares\obj\Debug\UnlockSoftwares.application
33 |
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.vbproj.GenerateResource.cache:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/obj/Debug/UnlockSoftwares.vbproj.GenerateResource.cache
--------------------------------------------------------------------------------
/UnlockSoftwares/obj/Debug/UnlockSoftwares.vbprojAssemblyReference.cache:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/ABOATDev/UnlockSoftwares/7a0b8d827416dd204e6fa0158e0ee665aa581957/UnlockSoftwares/obj/Debug/UnlockSoftwares.vbprojAssemblyReference.cache
--------------------------------------------------------------------------------