Skip to content

Latest commit

 

History

History
560 lines (337 loc) · 37.2 KB

README.md

File metadata and controls

560 lines (337 loc) · 37.2 KB

Disclaimer: All content is for informational research, learning, and exchange purposes only, to be used in a lawful and compliant manner. Thank you.

Introduction

The project involves interdisciplinary applications and analysis of information: desktop baseline checks, software activation/cracking, antivirus evasion and privilege escalation, firmware identification and read/write for penetration support, host account null password detection, Wi-Fi password scanning, cloud host security hardening, host system log analysis, natural language processing, and data analysis in humanities and social sciences.

  • System Platforms: Windows/Mac/Linux; Scripting Languages: Multiple, flexible; customized as needed.
  • Research Focus: Basic information automation, cloud host/local desktop security processing, social science information technology, and data analysis.

The project code involves component version compatibility issues. Click here for more details; regarding the inability to preview ipynb on GitHub, please refer here; to generate automated information processing reports, check the d-xlsx directory for more details.

Windows Server Domain Controller

Daily operation records of a domain administrator.

Click for details Script Locations:

Illustrated Versions:

Windows Desktop Technical Baseline Check

First, ensure that PowerShell is enabled on your system:

  • Enable PowerShell feature: Set-ExecutionPolicy RemoteSigned
  • Disable PowerShell feature: Set-ExecutionPolicy Restricted
Click for Details

One-click usage, local download Graphical Version


irm #|iex

Feature Overview:

  1. Check IP and network device connectivity status
  2. Check printer, print spooler, and scanner status
  3. Check basic driver information for hard drives, CPUs, memory, graphics cards, etc.
  4. Check device security, recent updates, scheduled tasks, certificate policies, system core file access control
  5. Check host active sharing protocol-related information
  6. Check computer sleep, reboot frequency, abnormal shutdown, program crashes, etc.
  7. Execute all functions of options 1–6
  8. Generate analysis reports for "Device Driver Check", "Five-Day Warning Events", "Login/Logout Activity Logs", "Monthly Threat Overview"
  9. View guidance and development instructions

By the way

Linux baseline check (PR) can be found at: al0ne/LinuxCheck. For Macs, maintaining these security services is not suitable for small and medium-sized businesses.

In the broader context, this article CSDN - Three Methods to Manage Mac Computers in Enterprises mentions management strategies that are considered effective, but compared to Windows, they are still not sufficient.

Windows Enterprise Basic Environment Requirements

Main Involves:

  • IE, Windows Defender, Windows Update, Flash & Chrome v87, DingTalk silent installation, automatic printer installation
  • File checksum tools: MD5, SHA1, SHA256 hash calculation, comparison, verification tools.
  • C drive space cleanup: DingTalk, WeChat, Foxmail local cache, Windows.old, Windows upgrade logs, files, etc. One-click cleanup script (C drive Thanos script).
  • Basic skills required for job positions, IQ and EQ assessment, salary range summary, and demand analysis.
Click for Details

Prevent Edge hijacking IE Graphical Version

curl -L  #|cmd

Calculate IE compatible view website hex, one-click usage, need to convert to GB2312 encoding for local use.


irm #|iex

One-click permanently disable Windows update settings Graphical Version

curl -L  #|cmd

One-click restore disabled Windows update settings

curl -L  #|cmd

One-click enable or disable Windows Defender real-time protection (discontinued, suggest using sordum.org/defender-control)

curl -OfsSL #&&call choice_wdrt.bat

C drive Thanos script: One-click cleanup of DingTalk, WeChat, Foxmail local cache, Windows.old, Windows upgrade logs, files, etc.

curl -OfsSL #

One-click check if a program runs with administrator rights

curl -OfsSL#

One-click MD5, SHA1, SHA256 file verification tool

curl -OfsSL #&&call md5tools.bat

One-click install Flash and configure supported Chrome version 87

curl -OfsSL #&&call fxxk_chxxa.bat

One-click block Chrome browser updates

curl -OfsSL #&&call deny_chrome_update.bat

One-click PDF to PNG

python3 -c "$(curl -fsSL #)"

One-click fix for shared printer 0x11b error

curl -OfsSL #&&call fix_0x11b_share_print.bat

One-click retrieve job position information and reference material websites

python3 -c "$(curl -fsSL #)"

Install specified Chrome and block updates: only_install_chrome65.bat ; DingTalk silent install source code: dingding

Linux Cloud Server Security Transformation

Cloud servers purchased from cloud service providers generally have no security software protection. Every day, cybercriminals scan public networks, attempting to remotely brute-force and invade servers. Therefore, preventive and defensive measures need to be taken.

Click for details

One-click configuration for SSH login, user password policy, and Ban IP setup Image & Text Version

  • SSH Login: Key-based login without password, long heartbeat connection to prevent client disconnection
  • Password Policy: No restrictions on special characters or case, supports minimum length of 4-5 characters
  • Ban IP: Permanently ban IP after three failed login attempts within 30 seconds, except for your own IP.

sudo bash -c  "$(curl -fL #)"

SSH single configuration: One-click SSH fast configuration for SSH key login policy and simple password rules. (The single configuration part restricts access to only your IP, i.e., AllowUsers)


sudo bash -c  "$(curl -fL #)"

fail2ban single configuration: One-click fail2ban setup, from download to installation, configuration generation, and service start. (You can refresh your public IP configuration with the single part.)


sudo bash -c  "$(curl -fL #)"

One-click to create a custom user with admin privileges Image & Text Version

  • Custom username
  • No-password for su, sudo, and wheel group members
  • Lock root remote login in sshd_config to enhance security

sudo bash -c  "$(curl -fL #)"

One-click FTP setup Image & Text Version

  • Shared directory: /var/ftp/share
  • Limit unauthorized access to shared directories, allowing read and write.
  • Secure, privatized, limited to your public IP access.

No password version, username: ftpuser, password: P@ssw0rd


sudo bash -c  "$(curl -fL #)"

Custom user version


sudo bash -c  "$(curl -fL #)"

Analysis of Common Platform Hot Searches and Rumor Refutation

This section involves interdisciplinary and basic research of humanities and social science journals and paper research subjects (including colleague interviews, online forum surveys, etc.).

  • HTML web page parsing, web UI automation
  • Data collection, filtering, classification, and archiving
  • Basic mathematical statistics of "averages/extremes," word segmentation, sentiment value calculation and summary (natural language processing)
Basic operations when first starting, simple information collection test.

One-click access to Chita.ru News information Text version

python3 -c "$(curl -fsSL https://ghp.ci/https://raw.githubusercontent.com/Excalibra/scripts/main/d-python/get_chita_news.py)"

One-click access to Chita.ru News information in Ruby

ruby -e "$(curl -fsSL https://ghp.ci/https://raw.githubusercontent.com/Excalibra/scripts/main/d-ruby/get_chita_news.rb)"

One-click generate global information reports Text version

python3 -c "$(curl -fsSL https://ghproxy.com/https://github.com/Excalibra/scripts/blob/main/d-python/get_worldometers.py)"

One-click collect the top posts on Reddit

python3 -c "$(curl -fsSL https://raw.githubusercontent.com/Excalibra/scripts/blob/main/d-python/reddit_data_demo.py)"

Collect 90 job posts and salary details HH.ru Text version

python3 -c "$(curl -fsSL https://ghproxy.com/https://github.com/Excalibra/scripts/blob/main/d-python/hh.ru_demo.py)"
Platform Hot Search and Rumor Refutation Summary and Analysis

Prerequisite: Before starting, first copy and run the following command to install the pip package. Data involving Stanford University’s language model stanza requires an external network connection.

pip3 install --no-cache-dir -r https://ghproxy.com/https://raw.githubusercontent.com/Excalibra/scripts/main/d-txt/requirements.txt

Draft - Hot Search Collection and Analysis for #1, #2, #3

One-click collect today’s hot searches from #1, #2, and #3 Text version (NLP: Stanza)

python3 -c "$(curl -fsSL #)"
  • Automated categorization; overall match rate: 84%~96% range.
  • Word frequency statistics; hot searches common across all three platforms indicate lasting public interest, with higher information density.
  • Sentiment average, sentiment value for each headline; main focus: the intensity of sentiment for manually pinned hot searches.
  • Part-of-speech analysis; highlights words likely to have guiding or implanted awareness components, such as excessive use of attributive and adverbial phrases, which are often promotional in nature.

# has the most noise in automated categorization, with low informational value, large amounts of superficial content, and higher distortion. The hot search headlines across platforms also have unmarked rumor components, so it's best to use the National Rumor Refutation Platform for verification. Despite its heavy entertainment focus, # social media model allows rapid dissemination of information when social events trend, sparking public attention and discussion.

Automated Collection of Rumor Refutation Items and Language Analysis

The function is generally similar to the previous example, performing grammatical analysis on high-frequency words. (NLP: ThuLAC)

python3 -c "$(curl -fsSL #)"

urllib3: #

Definition of rumors: Gordom W. Allport and Leo Postman first defined rumors as propositions related to current events, circulated between people through oral media, lacking specific evidence to verify their accuracy. 1

Concept of rumors: Essentially, rumors generally have two attributes: widespread dissemination and uncertainty. Based on this, this paper defines rumors as information that is widely spread and carries a high degree of uncertainty. "Uncertainty" mainly refers to the uncertainty about the truth of the information. 2

Currently, among various rumors during emergencies, there are relatively few with clear malicious intent or with goals such as achieving political, economic, or other interests. Most rumors are formed out of fear and based on erroneous judgments. (Hu Qi, 2022) From the collected rumors analysis, the two largest categories are social topics and healthy eating, accounting for 48% and 43%, respectively.

However, the blending of multiculturalism and fragmented interpretations in the "post-truth" era has intensified the value divergence among the public, eroding the trust foundation. On one hand, the complex interests, diverse social ideologies, and various modes of communication intersect to create a diverse network culture in the "post-truth" era, increasing collisions and friction between mainstream and non-mainstream cultures. While non-mainstream cultures can be a beneficial supplement to mainstream culture, negative elements like "Buddhism culture," "internet celebrity culture," and "lying flat culture" often deviate from mainstream culture, especially distorting aesthetics and promoting money worship, which can mislead audiences with limited knowledge and experience, leading to political biases and eroding existing political trust. On the other hand, in the "post-truth" era, faced with an overwhelming amount of information, people tend to piece together facts and interpret the truth in fragmented ways. Once it concerns complex political rumors about social divisions, interest distribution, political corruption, and policy failures, people easily fall into continuously interpreting and reconstructing fragmented information, creating multiple "truths" that further ferment, thus causing frequent doubts about established political consensus, resulting in the loss of political trust and providing opportunities for the spread of rumors. 3

Research on Bilibili/B-zhàn (popular video-sharing platform based in China) User Comments and Bullet Chats

The script provides the following features:

  1. Video Information: Title, author, publication date, views, favourites, shares, total bullet chats, number of comments, video description, category, video link, and thumbnail link.
  2. Bullet Chat Analysis: 100 bullet chats including sentiment score, parts of speech analysis, timestamp, and user ID.
  3. Top Comments: 20 popular comments including number of likes, sentiment score, replies to the topic, member ID, member name, and comment time.
  4. Enhanced Features: For bullet chats: Displays username, date of birth, registration date, number of fans, and number of accounts followed (requires cookies).
    • For comments: Shows the IP location of the commenting user (requires web interface).
  5. Output:
    • Generates an Excel file (xlsx) including:
      • Median sentiment score of text,
      • Word frequency statistics,
      • Word cloud visualisation,
      • Bar charts.
Click for details

Prerequisite: Ensure that your basic library components are complete.

pip3 install --no-cache-dir -r https://ghproxy.com/https://raw.githubusercontent.com/Excalibra/scripts/refs/heads/main/d-txt/requirements.txt

Then run the script Text version

python3 -c "$(curl -fsSL https://ghproxy.com/https://github.com/Excalibra/scripts/blob/main/d-python/get_bv_baseinfo.py)"

Basic Text Analysis

Stopword text clustering comprehensive statistical analysis, see the image below 1

In fact, different stopword lists have their applicable scopes. Most educational institution corpora are based on academic literature, so stopword lists from institutions like Fudan and Sichuan University are more suited for documents and emails. In contrast, portal websites' corpora are more suited for news reports, each with its own characteristics.

Text mining and word segmentation statistics involve stopword issues, which are enhanced by integrating stopword lists from Harbin Institute of Technology, Sichuan University, and Baidu, as well as Fudan’s stopword list collected from CSDN, to strengthen the clustering effect of text on "economy," "society," and "literature" to better target keywords.

Text analysis work content is shown in the referenced image 2. The objectives are similar, only the methods differ slightly, but the results are the same.

Basic Research on Sociological Topics

This section focuses on analyzing internet news media and network community organization mobilization.

Click for details

Overall, in the post-emotional era, I have come to realise that people's emotional experiences are diverse. Based solely on the interviewees' quotes regarding topics such as "romantic pairing fandoms" (commonly referred to as "shipping" — where fans enthusiastically support the idea of two characters, real or fictional, being in a romantic relationship) and "cute pets," it can be concluded that some interviewees hold simplistic, idealised views. This is unreliable and cannot be generalised. A more realistic perspective would suggest that some interviewees may not care about these topics, or they may not have given them much attention or a deeper understanding. Moreover, the data cannot provide definitive conclusions about the interviewees' emotions, thoughts, or behavioural logic; it merely points to certain connections. To uncover the truth and the underlying logic of these matters, further time and effort must be invested in research.

Positive Behavioral Role of People's Livelihood Commentary Media

In a one-dimensional society1, people from different regions often face similar life difficulties and social disputes. Through media selection of typical people's livelihood cases, it is easy for the public to gain a personal experience, creating cross-regional emotional resonance. Timely commentary based on this follows the principle of seeking truth from facts, analyzing various public opinion hot topics scientifically and rationally, while proposing feasible and constructive plans for the future. To a certain extent, this alleviates social contradictions, guides public emotions, and helps open the people's minds. However, it is important to emphasize that the purpose of opening the people's minds is for them to develop critical thinking, independent thought, and objective analysis of problems. It highlights the need for social progress, not to belittle the intellectual level and capabilities of the public.

Attribution of Focus Loss Phenomenon in People's Livelihood Commentary News Audiences

On one hand, audiences receive people's livelihood and timely commentary information due to personal resonance, curiosity, and other factors. On the other hand, living in a risk society3, audiences develop a psychological rejection of serious content and need a topic for casual conversation and entertainment to relieve anxiety, seek pleasure, and simultaneously look for groups with similar interests. This can also explain my previous question: "Why do I see my colleagues handle daily work efficiently, but when it comes to TV dramas or news reports, they are like parrots with no opinions, like idiots?" In general, the phenomenon of losing focus in public opinion is inevitable and normal. The audience's curiosity about news headlines, their patience for waiting and deep thinking about events no longer meets the expectations of some audience members. With limited attention and energy, these audience members turn to other topics with entertainment value and casual discussions, like popcorn-style leisure entertainment (gossip), to relieve stress and gain pleasure.

The term "Little Pink" is used by the public to refer to the online patriotic youth group. "Little" refers to their young age, which makes them seem naive but full of energy and passionate; "Pink" refers to the unique way of expression on the internet, such as using cute language and various "kawaii" emoticons. Moreover, due to their youth, their life experiences have not yet shaped their minds; "Red" refers to the strong patriotism and love for the party and leader, which is commonly associated with the Chinese Communist Party in the Chinese context.4

Liu Fang's definition of the "Little Pink" group is accurate. She further divides the group into different age ranges, social classes, and occupational backgrounds. Among those aged 18 to 24, the student group accounts for a large proportion of the "Little Pink," most of whom come from working-class families. However, prior to the popularity of the Old Bull Sail model, a significant number of "Little Pink" came from middle-class urban families, which also needs to be noted. In any case, both groups share a common characteristic: the "Little Pink" group has strong social consumption ability and purchasing power, bears relatively less social pressure, and is a beneficiary and witness to the increasing national power brought by China's reform and opening up.

Emperor Bar Expedition: Group Mobilization and Public Opinion Guidance

When the culture of a group aligns with the values and goals they advocate, it forms a driving force that encourages group members to culturally identify with the Emperor Bar community from multiple perspectives and to engage in collective interaction. Through organized mobilization, Emperor Bar profoundly influences the values and thinking patterns of its members, thereby motivating their enthusiasm and unity to support collective activities within the community.

On internet platforms, the expression of nationalism has become a common phenomenon. Through shared symbols, behaviors, and establishing connections with others who share similar views, individuals express their identification with their country and ethnicity. This performance of identity politics is influenced by both the individual and external environmental factors. In the "Zhou Ziyu Incident," Emperor Bar fully utilized the connectivity of the internet, climbing rankings and driving traffic across platforms. By constructing a common "patriotism" and "nationalism" discourse, they mobilized and recruited participants. Although the "Emperor Bar Expedition" appeared to be well-organized, with participants adhering to commands, having clear departure times, discipline, and attack targets, and requiring the use of collective templates, in practice, the youth mobilized by the new discourse of Emperor Bar did not necessarily need to engage in deep logical thinking or provide arguments. Instead, the expedition became a festive and noisy game, aimed at creating a situation of collective enthusiasm. In this mobilization process, celebrity-related emoticons created a heightened atmosphere, combining stars with nationalist sentiment, further strengthening collective identification and mobilizing effects, stimulating emotional resonance among fans, and increasing their willingness to support and participate in collective actions.

Therefore, the "Emperor Bar Expedition" can be seen as an activity of collective mobilization and public opinion guidance, where the joint forces of symbols, discourse, and emotion mobilize fans to participate and support, forming a polarized group action force. This action gives network violence a "nationalism" and "patriotism" legitimized image, making it widely accepted and supported within the group.

Research Purpose and Significance

Research Purpose (Micro):

  1. Define the concepts of "lurkers" and "digital native lurkers" to eliminate the ambiguous definition of lurking.
  2. Construct a motive model for lurking behavior and propose hypotheses explaining the motivations behind digital natives' lurking behavior.
  3. Clarify the main influencing factors and their interrelationships.
  4. Provide more effective suggestions for network operators and community managers.

Research Significance (Macro):

1. Theoretical Significance: Review relevant theories used in the study of lurking from sociology, economics, and psychology, and build a theoretical framework for lurking research to provide theoretical support for future researchers.

2. Practical Significance: The practical significance of studying digital natives' lurking behavior mainly lies in economic benefits, the sustainable development of the internet, and collective intelligence.

  • Reliability Analysis: This primarily examines whether the Cronbach's alpha value of each latent variable exceeds the critical value of 0.7.
  • Validity Analysis: This is mainly tested through factor analysis, specifically by performing a KMO (Kaiser-Meyer-Olkin) coefficient analysis on the sample data. Kaiser provided commonly used KMO measurement standards:
    • Above 0.9 indicates excellent suitability,
    • 0.8 indicates good suitability,
    • 0.7 indicates average suitability,
    • 0.6 indicates low suitability, and
    • Below 0.5 indicates very poor suitability.
  • Factor Correlation Analysis: Bartlett's test of sphericity is used to examine whether there is a correlation among the observed variables. This is a prerequisite for conducting factor analysis. The test is based on the null hypothesis that there is no correlation among the observed variables. If the significance level obtained from Bartlett's test of sphericity is low (commonly set at 0.05), the null hypothesis can be rejected, indicating that there is a correlation among the observed variables and that factor analysis is suitable.
  • Scale Granularity Analysis: The Likert scale typically has 5 or 7 levels, but other numbers can also be used. Choosing an appropriate range of levels should consider the ease with which respondents can understand and answer. Fewer levels may restrict respondents when selecting a neutral option, while more levels may increase the complexity of their choices.
  • Exploratory Analysis:

    1. How many government officials read Marx, and how many believe in Marx?
    2. Conduct a comprehensive analysis of employment, including individuals, enterprises, and related fraud cases.

    Exploratory Analysis:

    • How many government officials read Marx, and how many believe in Marx?
    • Conduct a comprehensive analysis of employment, including individuals, enterprises, and related fraud cases.
    Click for details
    Reasons for the decline in Marxism's prestige:

    Negative factors: 1. The failure of the Soviet-style socialist system dealt a significant blow. 2. The behaviour of some Communist Party officials and Marxist theorists, which contradicted their principles, severely damaged Marxism's reputation. 3. Many people do not understand Marxism well, cannot apply it, and fail to solve practical problems. 4. The rejection of Marxist theories by certain individuals has also contributed to its decline.

    Positive factors: 1. Horizontally, reforms and opening up have broadened our theoretical perspectives, reducing the relative importance of Marxism. 2. Vertically, the creation of new theories such as socialism with Chinese characteristics has further diminished Marxism's relative significance. 3. People are increasingly adopting a scientific and analytical approach to Marxist teachings, causing its prestige to fall from its peak.

    Core Motivations of Fraudsters

    We are surrounded by grand narratives and emotional reflections, but what we often lack is “the facts themselves.” Today, things have improved compared to the past, where information dissemination was limited to search engines and web portals. Now, with the advent of social media and greater public scrutiny, transparency has increased. However, this also introduces a new challenge: the prevalence of review moderation and content control. Given the current system and structure in our country, the overall outlook remains challenging. Our understanding is largely shaped by the cost others pay and the information disclosed.

    • The fraudster’s objectives are diverse, including obtaining money, controlling individuals, or acquiring labour.
    • The job seeker's objective is relatively singular: providing labour in exchange for money.

    It is worth noting that both fraudsters and job seekers are ultimately seeking to acquire money from one another. This creates a zero-sum game based on incomplete information.

    Fraudsters, with their varied objectives and preferences, have a broad range of strategies and approaches. They exhaust all possible means to maximise their benefits. The core strategy of fraudsters is to target specific contexts and scenarios, aiming to acquire the worker's money either before or after they perform labour.

    Fraudsters' Construction of Belief and Fraud Implementation

    For fraudsters, whether they succeed in deceiving a job seeker is a matter of probability. Job seekers come from various backgrounds, and their behaviour is unpredictable. However, one critical point must be noted: fraudsters succeed in deceiving those who believe they are not fraudsters. In other words, the key to fraudsters' success lies in building trust with the job seekers.

    Although each individual's actions are unpredictable, fraudsters employ various methods to create a specific sense of scarcity, which fosters trust. Using this trust, they can introduce conditions to manipulate the job seeker's intentions and behaviour.

    Specifically, fraudsters often apply social psychology to construct dilemmas and staged scenarios to influence the thoughts and emotions of job seekers. They frequently highlight limited job openings, urgent deadlines, special insider opportunities, or other forms of scarcity to stimulate competitiveness and desire among job seekers, pushing them to make quick decisions.

    Once trust is established in these high-pressure scenarios, fraudsters often ask job seekers to demonstrate their “sincerity” and “willingness to cooperate.” At this stage, fraudsters may request personal information, payment of fees, or completion of specific tasks. While these requests may seem reasonable, they are, in fact, aimed at obtaining sensitive information or economic gain from the job seeker.

    Various Management Maintenance Scripts

    Click for Details

    Complete tool, scripts, documentation

    Wallpaper Settings | Quick Web Pages

    Work and live simultaneously.

    1. Ruby must be version 3.0 or above
    2. Ruby's integration on Windows is not as smooth as on Linux/macOS.
    3. For this Ruby-based screen scraping and text processing, Ruby's library support is far less comprehensive than Python, suitable only for basic web scraping tasks.
    4. If due to network conditions in certain countries, native writing should be avoided; instead, aria2 is used for downloading, to monitor the progress.
    Click for details

    Wallpaper Settings

    One-click Bing wallpaper downloader Image & Text Version

    python3 -c "$(curl -fsSL https://ghproxy.com/https://raw.githubusercontent.com/Excalibra/scripts/refs/heads/main/d-python/get_bing_wallpapers.py)"

    One-click download of Microsoft official design wallpapers using Ruby

    ruby -e "$(curl -fsSL #)"

    One-click scheduled wallpaper change (Mac only)

    bash -c "$(curl -fsSL #)"

    Quick Web Pages

    Windows web page opening tool

    curl -OfsSL #

    Mac web page opening tool

    bash -c "$(curl -fsSL #)"

    Fun Projects

    This section contains fun projects created through my exploration, combining various online resources, source codes, and unique keys, reimagined and transformed into usable commands.

    • Windows/Office, WinRAR, EmEditor, IDM, XchangePDF
    • Wi-Fi, LAN IP viewer, Host IP operator and location lookup
    • More...
    Click for more details

    CMD one-click call to switch Windows versions and activate Windows/Office

    curl -O https://ghproxy.com/https://raw.githubusercontent.com/TerryHuangHD/Windows10-VersionSwitcher/master/Switch.bat&&TIMEOUT /T 1&&start Switch.bat&&powershell -command "irm https://massgrave.dev/get|iex"

    CMD one-click install WinRAR registration and activation

    powershell -command Invoke-WebRequest -Uri "https://ghproxy.com/https://github.com/Excalibra/scripts/raw/refs/heads/main/d-bat/winrar_down_reg.bat" -OutFile "C:/Users/${env:UserName}/Downloads/winrar_down_reg.bat"&&TIMEOUT /T 1&&start /b C:\Users%username%\Downloads\winrar_down_reg.bat
    

    Powershell one-click EmEditor serial key generator

    irm https://ghproxy.com/https://raw.githubusercontent.com/Excalibra/scripts/refs/heads/main/d-pwsh/emeditor_random_keygen.ps1|iex
    

    Powershell one-click IDM activation

    iwr -useb https://ghproxy.com/https://raw.githubusercontent.com/lstprjct/IDM-Activation-Script/main/IAS.ps1 | iex
    

    Small Utilities

    Various small tools for convenience.

    Click for more details

    Restore Win10 right-click menu or revert Win11 right-click menu

    curl -OfsSL https://raw.githubusercontent.com/Excalibra/scripts/refs/heads/main/d-bat/right-menu.bat&&call right-menu.bat
    

    Unlock application permission issues preventing deletion

    curl -OfsSL https://raw.githubusercontent.com/Excalibra/scripts/refs/heads/main/d-bat/unlockapp.bat&&call delete-error.bat
    

    Thank you for viewing. Here are the LaTex Demo for fellow enthusiasts.