Jump to content

Patchs d'activation

5 files


    # Overview
    Batch script(s) to automate the activation of supported Windows and Office products using local KMS server emulator, or external server. The script is designed not to override the permanent activation of products (Windows or Office), only non-activated products will be KMS-activated (if supported). The script correctly handle Windows 10 multi-editions-coexistence (since version 1607) to avoid changing current edition or override retail activation. The ultimate feature of this solution when installed, it will provide 24/7 activation, whenever the system itself request it (renewal, reactivation, hardware change, Edition upgrade, new Office...), without needing interaction from user. Some security programs will report infected files due KMS emulating, this is false-positive, as long as you download the file from this trusted Home Page. Therefore, temporary suspend Antivirus realtime protection, or exclude the downloaded file and extracted folder from scanning to avoid quarantine.
    If you are installing Auto Renewal setup then you also need to exclude this file:
    C:\Windows\system32\SppExtComObjHook.dll Refer to the included ReadMe.html file, or the online ReadMe page here or here for more info on:
    What is KMS activation? KMS Emulator? How does it work? Supported Products. Converting Office ClickToRun Retail to Volume. How to use. Activation modes, features and additional options. Debugging and troubleshooting activations errors. SppExtComObjHook.dll source code. # AIO vs. Traditional
    The KMS_VL_ALL_AIO fork has these differences and extra features compared to the traditional KMS_VL_ALL:
    Portable all-in-one script, easier to move and distribute alone. All options and configurations are accessed via easy-to-use menu. Combine all the functions of the traditional scripts (Activate, AutoRenewal-Setup, Check-Activation-Status, setupcomplete). Required binary files are embedded in the script (including ReadMeAIO.html itself), using ascii encoder by @BAU [AveYo]. The needed files get extracted (decoded) later on-demand, via Windows PowerShell. Simple text colorization for some menu options (for easier differentiation). Auto administrator elevation request. # Brief guidance for AIO script
    Doubleclick the cmd and select [1] for onetime KMS activation or [2] with autorenewal.
    [1] Activates the product(s) without autorenewal (180 days for VL products, 30 days for 8 Core/Pro-WMC and 45 days for 8.1 Core/Pro-WMC/Pro Student & 10 Home), need to be ran manually for renewal [2] Activates the product(s) with autorenewal, renews the KMS activation frequently [3] Uninstalls the hookpatcher (when [2] is used) [4] Will create a log file for @abbodi1406 (or others) to review [5] When set to [Yes], will set the script to activate Windows [6] When set to [Yes], will set the script to activate Office [7] When set to [Yes], will set the script to convert the retail office C2R install to VL automated. [X] When set to [Yes], will set the script to skip KMS38 activated Windows 10 installs [8] Checks the current activation state by vbs [9] Checks the current activation state by wmic Creates a ready to go $OEM$ folder to insert in the "ISO:\Sources" folder, for use during windows installation [R] Opens the included readme file [E] Sets the script to use an external KMS server


       (1 review)



  2. Windows Loader

    Windows Loader v2.2.2 by Daz
    The safe and easy way to activate Windows.
    This is the loader application that's used by millions of people worldwide, well known for passing Microsoft's WAT (Windows Activation Technologies) and is arguably the safest Windows activation exploit ever created. The application itself injects a SLIC (System Licensed Internal Code) into your system before Windows boots; this is what fools Windows into thinking it's genuine.
    The things you might want to know
    It works on 32-bit and 64-bit systems It's compatible with Windows 7 SP1 and all system updates It's compatible with all system languages It can be used to pre-activate Windows It allows you to install custom OEM information It features application integrity checking It supports hidden partitions and some complex setups It can work alongside Linux's GRUB or any other boot manager It works with VMware, VirtualBox and Hyper-V It works with most hard drive encryption software e.g. TrueCrypt or BitLocker It allows you to add your own certificates and serials externally It will install just the certificate and serial for users with an existing SLIC It features automated system profiling (The application matches everything up for you) It won't modify any system files It runs before Windows is launched No extra processes are run so you have nothing eating at your RAM All key parts of the loader are encrypted with a custom encryption Every user has a unique version of the loader installed on his or her system Supported operating systems
    Windows 7 Ultimate Windows 7 Ultimate E Windows 7 Professional Windows 7 Professional E Windows 7 Home Premium Windows 7 Home Premium E Windows 7 Home Basic Windows 7 Starter Windows 7 Starter E Windows Vista Ultimate Windows Vista Business Windows Vista Business N Windows Vista Home Premium Windows Vista Home Basic Windows Vista Home Basic N Windows Vista Starter Windows Server 2008 Enterprise Windows Server 2008 Enterprise (Without Hyper-V) Windows Server 2008 Foundation Windows Server 2008 Standard Windows Small Business Server 2008 Windows Storage Server 2008 Standard Windows Storage Server 2008 R2 Essentials Windows Server 2008 R2 Enterprise Windows Server 2008 R2 Foundation Windows Server 2008 R2 Standard Windows Server 2008 R2 Datacenter Windows Small Business Server 2011 Standard Windows Small Business Server 2011 Essentials Windows Home Server 2011 Windows Server 2012 Standard Windows Server 2012 Essentials Windows Server 2012 Foundation Windows Server 2012 Datacenter Windows Storage Server 2012 Standard Windows Storage Server 2012 Workgroup Windows MultiPoint Server 2012 Standard Windows MultiPoint Server 2012 Premium Windows Server 2012 R2 Standard Application integrity checking?
    Hover your mouse over the green, amber or red icon to see detailed application information.

    Even if the icon is green it's still worth checking that the applications path is the same as the location from which you launched the application. You should also check that the applications MD5 matches the MD5 found online.
    Source : https://forums.mydigitallife.net/threads/windows-loader-download.58464/


       (3 reviews)



  3. AntiWPA

    AntiWPA v3.4.6 [x64 and x86]
    How to use
    Start AntiWPA3.cmd to install/uninstall the patch
    What the patch modifies
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AntiWPA is added to Registry File C:\windows\system32\AntiWPA.dll is added HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents] data for "OOBETimer" is changed {=OOBE} rundll32 setupapi,InstallHinfSection DEL_OOBE_ACTIVATE 132 syssetup.inf
    rundll32 setupapi,InstallHinfSection RESTORE_OOBE_ACTIVATE 132 syssetup.inf is executed which will remove/restore WPA-links from the startmenu How it works
    It tricks winlogon.exe to make it believe it was booted in safemode,thus, winlogon skips the WPA-Check. The trick is done by redirecting(=hooking) the windows function (user32.dll!GetSystemMetrics(SM_CLEANBOOT{=0x43}) & ntdll.dll!NtLockProductActivation) in memory to antiwpa.dll so winlogon 'thinks' was booted in safemode.
    *Note (...because some ppl were concered about): The patch do not alter any files on harddisk nor the hooks affects any other exe or dll in memory than winlogon.exe.
    The patch auto-runs on each start before the WPA-check via: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\AntiWPA
    The hooks are applied when AntiWPA.dll!onLogon is called by winlogon.exe.
    The Winlogon.exe file on the harddisk is not altered anymore.
    Patching (API-Hooking) is done in memory, so there are no problems with
    Windows System File Protection.
    Installation is performed via AntiWPA.dll!DllRegisterServer ("regsvr32 AntiWPA.dll").
    The file is copied to systemdir and the registrykeys are added.
    (Note: AntiWPA.dll is no ActiveX selfregisterdll.)
    Uninstallation is done via AntiWPA.dll!DllUnRegisterServer ("regsvr32 -u AntiWPA.dll").


       (1 review)



  4. The Windows 2003 & XP Anti Product Activation Crack

    The Windows 2003 & XP Anti Product Activation Crack 2.3
    The crack will patch some bytes in your winlogon.exe and totally disable the Windows Product Activation Check.
    Tested with winlogon.exe build:
    Windows XP  2600.5512 (SP3 RCx) Windows XP  2600.3264 (SP3 RC1) Windows XP  2600.2180 (SP2 RTM) Windows XP  2600.1106 (SP1) Windows XP  2600.0 (Retail) Windows 2K3 3790.0 (Retail) Windows 2K3 3790.1218 (8.7.2004) Windows Longhorn 4008 or 4015(not tested by myself) This version uses a generic patch engine which supports all current version of Windows and hopefully all future ones. :)


       (7 reviews)

    1 comment


  5. BypassESU

    L'utilitaire BypassESU permet de continuer de recevoir les mises à jour de sécurité sur Windows 7 jusqu’en janvier 2023.
    Pour plus d'informations : Windows 7 : recevoir les mises à jour de sécurité jusqu’en 2023
    Topic original sur My Digital Life : https://forums.mydigitallife.net/threads/bypass-windows-7-extended-security-updates-eligibility.80606/


       (8 reviews)



  • Create New...