├── .github └── workflows │ ├── win2019.yml │ └── win2022.yml ├── LICENSE ├── README.md ├── loop.bat ├── start.bat ├── wallpaper.bat └── wallpaper.png /.github/workflows/win2019.yml: -------------------------------------------------------------------------------- 1 | name: Windows 2019 2 | 3 | on: workflow_dispatch 4 | 5 | jobs: 6 | build: 7 | runs-on: windows-2019 8 | timeout-minutes: 360 9 | 10 | steps: 11 | - name: Getting Files Ready 12 | run: | 13 | Invoke-WebRequest https://storage.curvee.eu.org/ngrok-windows-amd64-v3.zip -OutFile ngrok.zip 14 | Invoke-WebRequest https://storage.curvee.eu.org/start-2019.bat -OutFile start.bat 15 | Invoke-WebRequest https://storage.curvee.eu.org/wallpaper.png -OutFile wallpaper.png 16 | Invoke-WebRequest https://storage.curvee.eu.org/wallpaper.bat -OutFile wallpaper.bat 17 | Invoke-WebRequest https://storage.curvee.eu.org/loop.bat -OutFile loop.bat 18 | 19 | - name: Extracting Ngrok File 20 | run: Expand-Archive ngrok.zip 21 | 22 | - name: Connect to Ngrok. 23 | run: .\ngrok\ngrok.exe authtoken $Env:NGROK_AUTH_TOKEN 24 | env: 25 | NGROK_AUTH_TOKEN: ${{ secrets.NGROK_AUTH_TOKEN }} 26 | 27 | - name: Enabling access to RDP. 28 | run: | 29 | Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -Name "fDenyTSConnections" -Value 0 30 | Enable-NetFirewallRule -DisplayGroup "Remote Desktop" 31 | Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -Name "UserAuthentication" -Value 1 32 | copy wallpaper.png C:\Users\Public\Desktop\wallpaper.png 33 | copy wallpaper.bat C:\Users\Public\Desktop\wallpaper.bat 34 | 35 | - name: Start Ngrok and Loop 36 | run: | 37 | .\ngrok\ngrok.exe tcp --region ap 3389 & 38 | cmd /c loop.bat 39 | -------------------------------------------------------------------------------- /.github/workflows/win2022.yml: -------------------------------------------------------------------------------- 1 | name: Windows 2022 2 | 3 | on: workflow_dispatch 4 | 5 | jobs: 6 | build: 7 | runs-on: windows-2022 8 | timeout-minutes: 9999 9 | 10 | steps: 11 | - name: Making the Core 12 | run: | 13 | Invoke-WebRequest https://storage.curvee.eu.org/ngrok-windows-amd64-v3.zip -OutFile ngrok.zip 14 | Invoke-WebRequest https://storage.curvee.eu.org/start-2022.bat -OutFile start.bat 15 | Invoke-WebRequest https://storage.curvee.eu.org/wallpaper.png -OutFile wallpaper.png 16 | Invoke-WebRequest https://storage.curvee.eu.org/wallpaper.bat -OutFile wallpaper.bat 17 | Invoke-WebRequest https://storage.curvee.eu.org/loop.bat -OutFile loop.bat 18 | - name: Extracting Ngrok File 19 | run: Expand-Archive ngrok.zip 20 | - name: Connect to Ngrok. 21 | run: .\ngrok\ngrok.exe authtoken $Env:NGROK_AUTH_TOKEN 22 | env: 23 | NGROK_AUTH_TOKEN: ${{ secrets.NGROK_AUTH_TOKEN }} 24 | - name: Enabling access to RDP 25 | run: | 26 | Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server'-name "fDenyTSConnections" -Value 0 27 | Enable-NetFirewallRule -DisplayGroup "Remote Desktop" 28 | Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -name "UserAuthentication" -Value 1 29 | copy wallpaper.png C:\Users\Public\Desktop\wallpaper.png 30 | copy wallpaper.bat C:\Users\Public\Desktop\wallpaper.bat 31 | - name: Open Tunnel. 32 | run: Start-Process Powershell -ArgumentList '-Noexit -Command ".\ngrok\ngrok.exe tcp --region ap 3389"' 33 | - name: Connect to your RDP 34 | run: cmd /c start.bat 35 | - name: Successfully made! You can close the tab now. 36 | run: cmd /c loop.bat 37 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | This is free and unencumbered software released into the public domain. 2 | 3 | Anyone is free to copy, modify, publish, use, compile, sell, or 4 | distribute this software, either in source code form or as a compiled 5 | binary, for any purpose, commercial or non-commercial, and by any 6 | means. 7 | 8 | In jurisdictions that recognize copyright laws, the author or authors 9 | of this software dedicate any and all copyright interest in the 10 | software to the public domain. We make this dedication for the benefit 11 | of the public at large and to the detriment of our heirs and 12 | successors. We intend this dedication to be an overt act of 13 | relinquishment in perpetuity of all present and future rights to this 14 | software under copyright law. 15 | 16 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 17 | EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 18 | MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. 19 | IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR 20 | OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, 21 | ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR 22 | OTHER DEALINGS IN THE SOFTWARE. 23 | 24 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | 2 | # Free RDP 6 HOURS 3 | 4 | 5 | 6 | ### HOW TO CREATE 7 | ``` 8 | > Press the Fork button to create RDP (For Android / HP Users, Please Use Desktop Mode). 9 | 10 | > visit https://dashboard.ngrok.com to get NGROK_AUTH_TOKEN 11 | 12 | > Inside this Repo Go to Settings> Secrets> New repository secret 13 | 14 | > Fill in the Name: Enter NGROK_AUTH_TOKEN 15 | 16 | > Fill in Value: Visit https://dashboard.ngrok.com/auth/your-authtoken Copy and Paste in the value 17 | 18 | > Press Add secret 19 | 20 | > Go to Action> CI> Run workflow 21 | 22 | > Refresh Web and go to CI> build 23 | 24 | > Press Down facing arrow button "RDP INFO LOGIN" To Get IP, User, Password. 25 | ``` 26 | ### WARN 27 | THIS IS ONLY FOR EDUCATIONAL PURPOSES DON'T USE FOR MINING OR ILLEGAL USE 28 | -------------------------------------------------------------------------------- /loop.bat: -------------------------------------------------------------------------------- 1 | @echo off 2 | echo RDP CREATION SUCCESSFULL! 3 | tasklist | find /i "ngrok.exe" >Nul && goto check || echo "Unable to get NGROK tunnel, make sure NGROK_AUTH_TOKEN is correct in Settings > Secrets > Repository secret. Maybe your previous VM is still running: https://dashboard.ngrok.com/status/tunnels" & ping 127.0.0.1 >Nul & exit 4 | :check 5 | ping 127.0.0.1 > null 6 | cls 7 | echo RDP CREATION SUCCESSFULL! 8 | goto check 9 | -------------------------------------------------------------------------------- /start.bat: -------------------------------------------------------------------------------- 1 | @echo off 2 | del /f "C:\Users\Public\Desktop\Epic Games Launcher.lnk" > out.txt 2>&1 3 | net config server /srvcomment:"Windows Server 2016 by @Davitt" > out.txt 2>&1 4 | REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /V EnableAutoTray /T REG_DWORD /D 0 /F > out.txt 2>&1 5 | REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v Wallpaper /t REG_SZ /d D:\a\wallpaper.bat 6 | net user administrator W2016 /add >nul 7 | net localgroup administrators administrator /add >nul 8 | net user administrator /active:yes >nul 9 | net user installer /delete 10 | diskperf -Y >nul 11 | sc config Audiosrv start= auto >nul 12 | sc start audiosrv >nul 13 | ICACLS C:\Windows\Temp /grant administrator:F >nul 14 | ICACLS C:\Windows\installer /grant administrator:F >nul 15 | echo Successfully Installed, If the RDP is Dead, Please Rebuild Again! 16 | echo IP: 17 | tasklist | find /i "ngrok.exe" >Nul && curl -s localhost:4040/api/tunnels | jq -r .tunnels[0].public_url || echo "Cannot get a troop tunnel, make sure ngrok_auth_token is correct in Settings> Secrets> Repository Secret.Maybe your previous VM is still running: 18 | https://dashboard.ngrok.com/status/tunnels " 19 | echo Username: administrator 20 | echo Password: W2016 21 | echo Please log in to your RDP! 22 | ping -n 10 127.0.0.1 >nul 23 | -------------------------------------------------------------------------------- /wallpaper.bat: -------------------------------------------------------------------------------- 1 | @echo off 2 | >nul 2>&1 "%SYSTEMROOT%\system32\cacls.exe" "%SYSTEMROOT%\system32\config\system" 3 | if '%errorlevel%' NEQ '0' ( 4 | echo Looking for Admin Access! 5 | goto UACPrompt 6 | ) else ( goto Meet Admin ) 7 | :UACPrompt 8 | echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\getadmin.vbs" 9 | echo UAC.ShellExecute "%~s0", "", "", "runas", 1 >> "%temp%\getadmin.vbs" 10 | "%temp%\getadmin.vbs" 11 | exit /B 12 | :Meet Admin 13 | if exist "%temp%\getadmin.vbs" ( del "%temp%\getadmin.vbs" ) 14 | pushd "%CD%" 15 | CD /D "%~dp0" 16 | REG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t REG_SZ /d FreeRDP /f 17 | REG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName\ /v ComputerName /t REG_SZ /d FreeRDP /f 18 | REG ADD HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\ /v Hostname /t REG_SZ /d FreeRDP /f 19 | REG ADD HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\ /v "AD Host" /t REG_SZ /d FreeRDP /f 20 | REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation /v Manufacturer /t REG_SZ /d "AdHost" /f 21 | REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation /v Model /t REG_SZ /d "AdHost Virtual Machine" /f 22 | REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OEMInformation /v SupportURL /t REG_SZ /d "https://github.com/MyOnee/R/issues" /f 23 | REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v TaskbarSmallIcons /t REG_DWORD /d 1 /f 24 | start explorer.exe 25 | -------------------------------------------------------------------------------- /wallpaper.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/MyOnee/R/f353e72f3cc31678442c123a6bab6380941b902d/wallpaper.png --------------------------------------------------------------------------------