Compare commits

...

2 Commits

Author SHA1 Message Date
WindowsAddict
e752461568 Evade AV's detection - 4 2024-05-27 07:54:12 +05:30
WindowsAddict
d14b3b46a0 Update readme 2024-05-27 07:44:10 +05:30
2 changed files with 13 additions and 5 deletions

View File

@ -9,8 +9,6 @@
:: This is a fork of @abbodi1406's KVA forums.mydigitallife.net/posts/838808
::_____________________________________
::
:: This script is a part of 'Microsoft-Activation-Scripts' (MAS) project.
::
:: Homepage: mass grave [.] dev
:: Email: windowsaddict@protonmail.com
::

View File

@ -18,12 +18,22 @@
- Right-click on the Windows start menu and select PowerShell or Terminal (Not CMD).
- Copy and paste the code below and press enter
`irm https://get.activated.win | iex`
```
irm https://get.activated.win | iex
```
or
```
irm https://massgrave.dev/get | iex
```
- You will see the activation options. Follow the on-screen instructions.
- That's all.
Note - On older Windows builds you may need to run the below command before,
---
- On older Windows builds you may need to run the below command before,
`[Net.ServicePointManager]::SecurityProtocol=[Net.SecurityProtocolType]::Tls12`
- The Powershell method does not work on Windows 7. Use the Method 2 - Traditional instead.
- The URL get.activated.win may be blocked by some DNS services because it is a new domain.
### Method 2 - Traditional