A Windows and Office activator using HWID / KMS38 / Online KMS activation methods, with a focus on open-source code and fewer antivirus detections.
https://massgrave.dev/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
|
2 months ago | |
|---|---|---|
| MAS | 2 months ago | |
| .gitattributes | 2 months ago | |
| LICENSE | 2 years ago | |
| README.md | 2 months ago | |
README.md

Microsoft Activation Scripts (MAS)
Open-source Windows and Office activator featuring HWID, Ohook, TSforge, and Online KMS activation methods, along with advanced troubleshooting.
How to Activate Windows / Office / Extended Security Updates (ESU)?
Method 1 - PowerShell ❤️
-
Click the Start Menu, type
PowerShell, and open it. -
Copy and paste the code below and press Enter.
- For Windows 8.1, 10 and 11:
irm https://get.activated.win | iexIf the above is blocked (by ISP/DNS), try this (needs updated Windows 10 or 11):
iex (curl.exe -s --doh-url https://1.1.1.1/dns-query https://get.activated.win | Out-String) - Script not launching? Use the below-listed Method 2.
- For Windows 8.1, 10 and 11:
-
In the menu that appears, type the number corresponding to one of the Green options.
Method 2 - Traditional (Windows Vista and later)
- Download the script:
- MAS_AIO.cmd (Direct script)
- MAS_AIO.zip (If the direct script is blocked by your browser)
- Run the
MAS_AIO.cmdfile. - In the menu that appears, type the number corresponding to one of the Green options.
[!TIP]
- Some ISPs/DNS providers block access to our domains. You can bypass this by enabling DNS-over-HTTPS (DoH) in your browser.
- Having trouble? Visit our troubleshooting page or raise an issue on GitHub.
[!NOTE]
- The
irmcommand in PowerShell downloads a script from a specified URL, and theiexcommand executes it.- Always double-check the URL before executing the command and verify the source is trustworthy when manually downloading files.
- Be cautious of third parties spreading malware disguised as MAS by altering the URL in the PowerShell command.






