mirror of
https://github.com/massgravel/massgrave.dev.git
synced 2024-11-23 23:10:55 +07:00
Add ps1 files as txt and add in _redirects
This commit is contained in:
parent
38bafacd6f
commit
aed061cc7d
@ -1 +1,2 @@
|
||||
/test /test.ps1 200
|
||||
/get /get.txt 200
|
||||
/ias /ias.txt 200
|
||||
|
40
static/get.txt
Normal file
40
static/get.txt
Normal file
@ -0,0 +1,40 @@
|
||||
# Check the instructions here on how to use it mass grave[.]dev
|
||||
|
||||
$ErrorActionPreference = "Stop"
|
||||
# Enable TLSv1.2 for compatibility with older clients
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12
|
||||
|
||||
$CommonURLPart = 'MAS/All-In-One-Version/MAS_AIO-CRC32_60BA35A8.cmd'
|
||||
$DownloadURL1 = 'https://bitbucket.org/WindowsAddict/microsoft-activation-scripts/raw/master/' + $CommonURLPart
|
||||
$DownloadURL2 = 'https://codeberg.org/massgravel/Microsoft-Activation-Scripts/raw/branch/master/' + $CommonURLPart
|
||||
$DownloadURL3 = 'https://raw.githubusercontent.com/massgravel/Microsoft-Activation-Scripts/master/' + $CommonURLPart
|
||||
|
||||
$URLs = @($DownloadURL1, $DownloadURL2)
|
||||
$RandomURL1 = Get-Random -InputObject $URLs
|
||||
$RandomURL2 = $URLs -notmatch $RandomURL1 | Get-Random
|
||||
|
||||
try {
|
||||
$response = Invoke-WebRequest -Uri $RandomURL1 -UseBasicParsing
|
||||
}
|
||||
catch {
|
||||
try {
|
||||
$response = Invoke-WebRequest -Uri $RandomURL2 -UseBasicParsing
|
||||
}
|
||||
catch {
|
||||
$response = Invoke-WebRequest -Uri $DownloadURL3 -UseBasicParsing
|
||||
}
|
||||
}
|
||||
|
||||
$rand = Get-Random -Maximum 99999999
|
||||
$isAdmin = [bool]([Security.Principal.WindowsIdentity]::GetCurrent().Groups -match 'S-1-5-32-544')
|
||||
$FilePath = if ($isAdmin) { "$env:SystemRoot\Temp\MAS_$rand.cmd" } else { "$env:TEMP\MAS_$rand.cmd" }
|
||||
|
||||
$ScriptArgs = "$args "
|
||||
$prefix = "@:: $rand `r`n"
|
||||
$content = $prefix + $response
|
||||
Set-Content -Path $FilePath -Value $content
|
||||
|
||||
Start-Process $FilePath $ScriptArgs -Wait
|
||||
|
||||
$FilePaths = @("$env:TEMP\MAS*.cmd", "$env:SystemRoot\Temp\MAS*.cmd")
|
||||
foreach ($FilePath in $FilePaths) { Get-Item $FilePath | Remove-Item }
|
29
static/ias.txt
Normal file
29
static/ias.txt
Normal file
@ -0,0 +1,29 @@
|
||||
# Check the instructions here on how to use it https://massgrave.dev/idm-activation-script
|
||||
|
||||
$ErrorActionPreference = "Stop"
|
||||
# Enable TLSv1.2 for compatibility with older clients
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12
|
||||
|
||||
$DownloadURL = 'https://raw.githubusercontent.com/WindowsAddict/IDM-Activation-Script/main/IAS.cmd'
|
||||
$DownloadURL2 = 'https://bitbucket.org/WindowsAddict/idm-activation-script/raw/main/IAS.cmd'
|
||||
|
||||
$rand = Get-Random -Maximum 99999999
|
||||
$isAdmin = [bool]([Security.Principal.WindowsIdentity]::GetCurrent().Groups -match 'S-1-5-32-544')
|
||||
$FilePath = if ($isAdmin) { "$env:SystemRoot\Temp\IAS_$rand.cmd" } else { "$env:TEMP\IAS_$rand.cmd" }
|
||||
|
||||
try {
|
||||
$response = Invoke-WebRequest -Uri $DownloadURL -UseBasicParsing
|
||||
}
|
||||
catch {
|
||||
$response = Invoke-WebRequest -Uri $DownloadURL2 -UseBasicParsing
|
||||
}
|
||||
|
||||
$ScriptArgs = "$args "
|
||||
$prefix = "@REM $rand `r`n"
|
||||
$content = $prefix + $response
|
||||
Set-Content -Path $FilePath -Value $content
|
||||
|
||||
Start-Process $FilePath $ScriptArgs -Wait
|
||||
|
||||
$FilePaths = @("$env:TEMP\IAS*.cmd", "$env:SystemRoot\Temp\IAS*.cmd")
|
||||
foreach ($FilePath in $FilePaths) { Get-Item $FilePath | Remove-Item }
|
@ -1 +0,0 @@
|
||||
write-host ":3"
|
@ -1 +0,0 @@
|
||||
write-host "hiii"
|
@ -1 +0,0 @@
|
||||
write-host "hiii :3"
|
Loading…
Reference in New Issue
Block a user