{"id":2638,"date":"2014-11-30T20:02:51","date_gmt":"2014-11-30T20:02:51","guid":{"rendered":"http:\/\/www.hexacorn.com\/blog\/?p=2638"},"modified":"2014-12-04T16:38:55","modified_gmt":"2014-12-04T16:38:55","slug":"sysinternals-eulagoogoolizer","status":"publish","type":"post","link":"https:\/\/www.hexacorn.com\/blog\/2014\/11\/30\/sysinternals-eulagoogoolizer\/","title":{"rendered":"Sysinternals&#8217;  Eulagoogoolizer"},"content":{"rendered":"<p><strong>Update<\/strong><\/p>\n<p>If you plan on using parts of it for pentesting purposes &#8211; you are doing it wrong \ud83d\ude42 I mention this cuz I saw someone suggesting it on Twitter.<\/p>\n<p>You don&#8217;t want to leave any traces in Registry &#8211; either you cough cough patch it, or use an alternative.<\/p>\n<p><strong>Old post<\/strong><\/p>\n<p>Sysinternals tools are great, but since Microsoft took over most of these software gems have been Eulaized &#8211; a pretty annoying thing, especially if you want to run them on a remote system. While some of the tools now accept the accepteula command line argument, sometimes it&#8217;s just handy to accept it all in one go.<\/p>\n<p>The below reg file does exactly this; you can also edit it and cherry-pick those apps you need.<\/p>\n<p>Note: It will only work if you save it as SysinternalsEulagoogoolizer.reg \ud83d\ude09<\/p>\n<pre style=\"padding-left: 30px;\">Windows Registry Editor Version 5.00\r\n\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\A]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Active Directory Explorer]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Autologon]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\AutoRuns]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\C]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\CacheSet]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\ClockRes]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Coreinfo]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Ctrl2cap]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\DbgView]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Desktops]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Disk2Vhd]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Diskmon]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\DiskView]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\EFSDump]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\FindLinks]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Handle]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Hex2Dec]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Junction]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\LdmDump]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\ListDLLs]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\LoadOrder]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Movefile]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PageDefrag]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PendMove]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PipeList]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Portmon]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\ProcDump]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Process Explorer]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Process Monitor]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsExec]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\psfile]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsGetSid]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsInfo]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsKill]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsList]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsLoggedon]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsLoglist]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsPasswd]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsService]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsShutdown]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\PsSuspend]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\RegDelNull]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Regjump]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Regsize]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\RootkitRevealer]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Share Enum]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\ShellRunas - Sysinternals: www.sysinternals.com]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\SigCheck]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Streams]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Strings]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Sync]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\TCPView]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\VMMap]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\VolumeID]\r\n\"EulaAccepted\"=dword:00000001\r\n[HKEY_CURRENT_USER\\Software\\Sysinternals\\Winobj]\r\n\"EulaAccepted\"=dword:00000001<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Update If you plan on using parts of it for pentesting purposes &#8211; you are doing it wrong \ud83d\ude42 I mention this cuz I saw someone suggesting it on Twitter. You don&#8217;t want to leave any traces in Registry &#8211; &hellip; <a href=\"https:\/\/www.hexacorn.com\/blog\/2014\/11\/30\/sysinternals-eulagoogoolizer\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[16],"tags":[],"_links":{"self":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/2638"}],"collection":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/comments?post=2638"}],"version-history":[{"count":5,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/2638\/revisions"}],"predecessor-version":[{"id":2644,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/2638\/revisions\/2644"}],"wp:attachment":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/media?parent=2638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/categories?post=2638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/tags?post=2638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}