From 8cd6209fc0568d5241bed07aa0dd58be7575c455 Mon Sep 17 00:00:00 2001 From: Calyx Hikari Date: Tue, 7 Oct 2025 15:21:15 +0800 Subject: [PATCH] Update auditbreak --- auditbreak | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/auditbreak b/auditbreak index 7687e01..84f612b 100644 --- a/auditbreak +++ b/auditbreak @@ -1,5 +1,3 @@ -# This script is hosted on https://get.msvc.win/ for MSVC Win Project
To get started, run irm https://get.msvc.win/auditbreak | iex inside of PowerShell
-
 # Define the embedded REG content
 $regContent = @"
 Windows Registry Editor Version 5.00
@@ -38,8 +36,8 @@ $tempRegPath = "$env:TEMP\AuditBreak.reg"
 $regContent | Out-File -FilePath $tempRegPath -Encoding ASCII
 
 # Check Audit Mode
-$auditKey = "HKLM\SYSTEM\Setup"
-$auditValue = "AuditInProgress"
+$auditKey = "HKLM\SYSTEM\Setup\Status"
+$auditValue = "AuditBoot"
 $auditStatus = Get-ItemProperty -Path $auditKey -Name $auditValue -ErrorAction SilentlyContinue
 
 if ($auditStatus.$auditValue -eq 1) {
@@ -47,12 +45,12 @@ if ($auditStatus.$auditValue -eq 1) {
 
     # Import the embedded REG file
     reg import $tempRegPath
-    Write-Host "Registry settings applied."
+    Write-Host "Audit Mode is now disabled."
 
     # Run your command
     $command = "net.exe user Administrator /active:yes"
     Start-Process -FilePath $command -Wait
-    Write-Host "Command executed."
+    Write-Host "Administrator account is now enabled."
 } else {
     Write-Host "Audit Mode is not active."
 }