mirror of
https://github.com/massgravel/Microsoft-Activation-Scripts.git
synced 2026-01-29 09:19:00 +01:00
A Windows and Office activator using HWID / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
Replaced the inefficient `Get-CimInstance | Where-Object` pipeline with a more performant `Get-CimInstance -Filter` call. The original script retrieved all SoftwareLicensingProduct instances and then filtered them in PowerShell. This change pushes the filtering logic down to the WMI service itself, which is significantly faster as it reduces the amount of data transferred. |
||
|---|---|---|
| App | ||
| .gitattributes | ||
| LICENSE | ||
| README.md | ||
| Run_GUI.cmd | ||

Microsoft Activation Scripts (MAS)
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.
How to Activate Windows / Office / Extended Security Updates (ESU)?
Method 1 - PowerShell ❤️
-
Click the Start Menu, type
PowerShell, and open it. -
Copy and paste the code below and press Enter.
- For Windows 8.1, 10 and 11:
If the above is blocked (by ISP/DNS), try this (needs updated Windows 10 or 11):irm https://get.activated.win | iexiex (curl.exe -s --doh-url https://1.1.1.1/dns-query https://get.activated.win | Out-String) - Script not launching? Use the below-listed Method 2.
- For Windows 8.1, 10 and 11:
-
In the menu that appears, type the number corresponding to one of the Green options.
Method 2 - Traditional (Windows Vista and later)
- Download the script:
- MAS_AIO.cmd (Direct script)
- MAS_AIO.zip (If the direct script is blocked by your browser)
- Run the
MAS_AIO.cmdfile. - In the menu that appears, type the number corresponding to one of the Green options.
Tip
- Some ISPs/DNS providers block access to our domains. You can bypass this by enabling DNS-over-HTTPS (DoH) in your browser.
- Having trouble? Visit our troubleshooting page or raise an issue on GitHub.
Note
- The
irmcommand in PowerShell downloads a script from a specified URL, and theiexcommand executes it.- Always double-check the URL before executing the command and verify the source is trustworthy when manually downloading files.
- Be cautious of third parties spreading malware disguised as MAS by altering the URL in the PowerShell command.






