refreshed old windows scripts collection

Cette révision appartient à :
Albirew 2024-06-12 19:45:10 +02:00
Parent 51aa6e6583
révision b640481ab1
Signé par: Albirew
ID de la clé GPG: 9D72DAEB1BB933C9
9 fichiers modifiés avec 97 ajouts et 21 suppressions

Voir le fichier

@ -7,11 +7,12 @@
set pdftk=%~dp0 set pdftk=%~dp0
:: ensuite, votre mot de passe pour chiffrer votre PDF :: ensuite, votre mot de passe pour chiffrer votre PDF
set pwd=Putain de mot de passe en or massif 24 carats serti de diamants! set "passwd=Putain de mot de passe en or massif 24 carats serti de diamants!"
if not exist "%pdftk%\pdftk.exe" echo pdftk.exe not found. exiting... & echo. & pause & exit 1 if not exist "%pdftk%\pdftk.exe" echo pdftk.exe not found. exiting... & echo. & pause & exit 1
if [%1]==[] goto noarg if [%1]==[] goto noarg
"%pdftk%\pdftk.exe" %1 cat output "%~dpn1-prot.pdf" encrypt_128bit owner_pw "%pwd%" allow Printing CopyContents "%pdftk%\pdftk.exe" %1 cat output "%~dpn1-prot.pdf" encrypt_128bit owner_pw "%passwd%" allow Printing CopyContents
if errorlevel 1 pause
exit exit
:noarg :noarg

22
windows/PDF-dechiffrer.bat Fichier normal
Voir le fichier

@ -0,0 +1,22 @@
@echo off
:: permet de chiffrer un fichier pdf avec pdftk simplement en lachant le fichier pdf sur ce bat.
:: vous aurez besoin de pdftk: http://www.accesspdf.com/pdftk/
:: utile pour faire chier les administrations en bloquant le copier-coller et en permettant que l'impression
:: si vous voulez placer ce fichier en dehors du dossier de pdftk, veuillez remplacer %~dp0 dans la ligne suivante
set pdftk=%~dp0
:: mettez ici votre mot de passe pour déchiffrer votre PDF
set "passwd=Putain de mot de passe en or massif 24 carats serti de diamants!"
if not exist "%pdftk%\pdftk.exe" echo pdftk.exe not found. exiting... & echo. & pause & exit 1
if [%1]==[] goto noarg
"%pdftk%\pdftk.exe" %1 input_pw "%passwd%" cat output "%~dpn1-unprot.pdf"
if errorlevel 1 pause
exit
:noarg
echo Usage: %~nx0 "file to unprotect.pdf"
echo.
pause
exit

23
windows/PDF-dechiffrer2.bat Fichier normal
Voir le fichier

@ -0,0 +1,23 @@
@echo off
:: permet de déchiffrer un fichier pdf avec qpdf simplement en lachant le fichier pdf sur ce bat.
:: vous aurez besoin de qpdf: https://github.com/qpdf/qpdf
:: utile pour stocker les PDF des administrations qui les protègent avec un mot de passe
:: si vous voulez placer ce fichier en dehors du dossier de pdftk, veuillez remplacer %~dp0 dans la ligne suivante
set qpdf=%~dp0\qpdf\bin
:: mettez ici votre mot de passe pour déchiffrer votre PDF
set "passwd=Putain de mot de passe en or massif 24 carats serti de diamants!"
set qpdf=%~dp0\bin
if [%1]==[] goto noarg
if [%2] neq [] (set passwd=%2)
"%qpdf%\qpdf.exe" --password=%passwd% --decrypt %1 "%~dpn1-unprot.pdf"
if errorlevel 1 pause
exit
:noarg
echo Usage: %~nx0 "protected file.pdf" "password"
echo.
pause
exit

Voir le fichier

@ -1,11 +0,0 @@
@echo off
:: Allow Windows explorer on Vista and up to use basic auth
echo Windows Registry Editor Version 5.00 >"%Temp%\WebDavBasicAuthLevel.reg"
echo. >>"%Temp%\WebDavBasicAuthLevel.reg"
echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\WebClient\Parameters] >>"%Temp%\WebDavBasicAuthLevel.reg"
echo "BasicAuthLevel"=dword:00000002 >>"%Temp%\WebDavBasicAuthLevel.reg"
"%windir%\regedit.exe" /s "%Temp%\WebDavBasicAuthLevel.reg"
net stop webclient
del "%temp%\WebDavBasicAuthLevel.reg"
net start webclient
echo Over, Have a nice Dav.

Voir le fichier

@ -1,9 +1,9 @@
@echo off @echo off
:: script to use when capture image capture shows error 0xc000000f (failed to start winload.*) under 2012r2 :: script to use when capture image capture shows error 0xc000000f (failed to start winload.*) under 2012r2
:: https://gist.github.com/Albirew/ff86c4871b252acf6d7b5c298283859c :: https://gist.github.com/Albirew/ff86c4871b252acf6d7b5c298283859c
echo ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» echo ######################################################################
echo º Bypass error 0xc000000f on capture.wim (failed to start winload.*) º echo # Bypass error 0xc000000f on capture.wim (failed to start winload.*) #
echo ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍŒ echo ######################################################################
echo. echo.
if [%1]==[] goto noarg if [%1]==[] goto noarg
:: UAC privilege escalation :: UAC privilege escalation
@ -40,8 +40,10 @@ echo OK!
exit exit
:noarg :noarg
echo.
echo Usage: drop on this .bat file the capture.wim file to fix. echo Usage: drop on this .bat file the capture.wim file to fix.
echo Or use the command line: %~nx0 X:\path\to\capture.wim echo Or use the command line: %~nx0 X:\path\to\capture.wim
echo Default is C:\RemoteInstall\Boot\x64\Images\ echo Default is C:\RemoteInstall\Boot\x64\Images\
echo.
pause pause
exit exit

Voir le fichier

@ -1,10 +1,11 @@
@echo off @echo off
:: rename file in .htaccess in widows (cuz microsoft is a dick that don't allow filename starting with a dot) :: rename file in .htaccess in windows
:: (cuz before windows 8 or 10, microsoft was a dick that don't allowed filename starting with a dot)
if [%1]==[] goto noarg if [%1]==[] goto noarg
ren %1 .htaccess ren %1 .htaccess
exit exit
:noarg :noarg
echo rename input file into .htaccess echo rename any input file into .htaccess
echo Usage: htaccess.bat "truc.txt" echo Usage: htaccess.bat "truc.txt"
pause pause
exit exit

Voir le fichier

@ -1,4 +1,5 @@
@echo off @echo off
:: This script allowed to remove the whole "Get Windows 10" annoyances on Windows7
:: Writed by CynerOne, updated and commented by Albirew :: Writed by CynerOne, updated and commented by Albirew
:: CynerOne original located here: http://lecrabeinfo.net/desinstaller-lapplication-obtenir-windows-10-supprimer-icone-windows-10.html#comment-2374542969 :: CynerOne original located here: http://lecrabeinfo.net/desinstaller-lapplication-obtenir-windows-10-supprimer-icone-windows-10.html#comment-2374542969
:: also added rev.18 of Matt's privilege escalation script: http://stackoverflow.com/posts/12264592/revisions :: also added rev.18 of Matt's privilege escalation script: http://stackoverflow.com/posts/12264592/revisions
@ -9,6 +10,7 @@
:: V6 modified error check to make it not stop when non fatal error occur and added script to automatically hide nasty updates on Windows Update ( https://gist.github.com/neckcen/f099eda0b1cde283cdc9 ) :: V6 modified error check to make it not stop when non fatal error occur and added script to automatically hide nasty updates on Windows Update ( https://gist.github.com/neckcen/f099eda0b1cde283cdc9 )
:: V7 added WGA update and fixed lack of escaping characters :: V7 added WGA update and fixed lack of escaping characters
:: V8 added KB3173040 :: V8 added KB3173040
:: V9 added script description
:: before anything, let's specify what "yes" is interpreted in your language (for takeown) :: before anything, let's specify what "yes" is interpreted in your language (for takeown)
for /F "tokens=3 delims= " %%G in ('reg query "hklm\system\controlset001\control\nls\language" /v Installlanguage') do ( for /F "tokens=3 delims= " %%G in ('reg query "hklm\system\controlset001\control\nls\language" /v Installlanguage') do (

Voir le fichier

@ -27,9 +27,9 @@ setlocal & pushd .
cd /d %~dp0 cd /d %~dp0
:: /UAC privilege escalation :: /UAC privilege escalation
echo ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» echo ####################################################################
echo º SMBv1 patch against malwares like WannaCry ou notPetya / Petwrap º echo # SMBv1 patch against malwares like WannaCry ou notPetya / Petwrap #
echo ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ echo ####################################################################
echo. echo.
:: deactivate SMBv1 on SMB server :: deactivate SMBv1 on SMB server
reg add "HKLM\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters" /v SMB1 /t REG_DWORD /d 0 /f reg add "HKLM\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters" /v SMB1 /t REG_DWORD /d 0 /f

36
windows/webDavOnVista+.bat Fichier normal
Voir le fichier

@ -0,0 +1,36 @@
@echo off
echo Allow Windows explorer on Vista and up to use basic auth
echo.
echo.
echo.
:: UAC privilege escalation
:checkPrivileges
NET FILE 1>NUL 2>NUL
if '%errorlevel%' == '0' ( goto gotPrivileges ) else ( goto getPrivileges )
:getPrivileges
if '%1'=='ELEV' (echo ELEV & shift /1 & goto gotPrivileges)
echo.
echo Invoking UAC for Privilege Escalation
setlocal DisableDelayedExpansion
set "batchPath=%~0"
setlocal EnableDelayedExpansion
echo Set UAC = CreateObject^("Shell.Application"^) > "%temp%\OEgetPrivileges.vbs"
echo args = "ELEV " >> "%temp%\OEgetPrivileges.vbs"
echo For Each strArg in WScript.Arguments >> "%temp%\OEgetPrivileges.vbs"
echo args = args ^& strArg ^& " " >> "%temp%\OEgetPrivileges.vbs"
echo Next >> "%temp%\OEgetPrivileges.vbs"
echo UAC.ShellExecute "!batchPath!", args, "", "runas", 1 >> "%temp%\OEgetPrivileges.vbs"
"%SystemRoot%\System32\WScript.exe" "%temp%\OEgetPrivileges.vbs" %*
exit /B
:gotPrivileges
if '%1'=='ELEV' shift /1
setlocal & pushd .
cd /d %~dp0
:: /UAC privilege escalation
net stop webclient
reg add "HKLM\SYSTEM\CurrentControlSet\services\WebClient\Parameters" /f /v BasicAuthLevel /t REG_DWORD /d 2
net start webclient
echo Done, Have a nice Day.
pause