A Windows and Office activator using HWID / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
Find a file
google-labs-jules[bot] 3961ed4991 feat: Optimize SoftwareLicensingProduct query
Replaced the inefficient `Get-CimInstance | Where-Object` pipeline with a more performant `Get-CimInstance -Filter` call.

The original script retrieved all SoftwareLicensingProduct instances and then filtered them in PowerShell. This change pushes the filtering logic down to the WMI service itself, which is significantly faster as it reduces the amount of data transferred.
2026-01-24 04:08:41 +00:00
App feat: Optimize SoftwareLicensingProduct query 2026-01-24 04:08:41 +00:00
.gitattributes Revert export-ignore 2025-11-19 03:59:34 +05:30
LICENSE LICENSE 2024-08-28 02:15:43 +05:30
README.md Clean up README.md a bit 2026-01-15 16:14:29 +04:00
Run_GUI.cmd feat: Optimize SoftwareLicensingProduct query 2026-01-24 04:08:41 +00:00

MAS Logo

Microsoft Activation Scripts (MAS)

Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.


How to Activate Windows / Office / Extended Security Updates (ESU)?

Method 1 - PowerShell ❤️

  1. Click the Start Menu, type PowerShell, and open it.

  2. Copy and paste the code below and press Enter.

    • For Windows 8.1, 10 and 11:
      irm https://get.activated.win | iex
      
      If the above is blocked (by ISP/DNS), try this (needs updated Windows 10 or 11):
      iex (curl.exe -s --doh-url https://1.1.1.1/dns-query https://get.activated.win | Out-String)
      
    • Script not launching? Use the below-listed Method 2.
  3. In the menu that appears, type the number corresponding to one of the Green options.


Method 2 - Traditional (Windows Vista and later)

  1. Download the script:
  2. Run the MAS_AIO.cmd file.
  3. In the menu that appears, type the number corresponding to one of the Green options.

Tip

Note

  • The irm command in PowerShell downloads a script from a specified URL, and the iex command executes it.
  • Always double-check the URL before executing the command and verify the source is trustworthy when manually downloading files.
  • Be cautious of third parties spreading malware disguised as MAS by altering the URL in the PowerShell command.

Homepage - https://massgrave.dev/

1.1 1.2 1.3 1.4 1.5 1.6 1.7


Latest Version: 3.9
Release date: 19-Nov-2025