Skip to content

Instantly share code, notes, and snippets.

View Jacob-Tate's full-sized avatar

Jacob Jacob-Tate

  • Kirkland, WA
View GitHub Profile
@Jacob-Tate
Jacob-Tate / solution.txt
Last active April 6, 2023 03:24
windows: 0x800705b4
Error:
After installing this update, users may experience this error "0x800705b4" when launching windows defender application guard or windows sandbox
Fix:
Use the credentials of a local admin to create and set the following registry keys on the host OS then restart the host.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Containers\CmService\Policy]
"DisableClone"=dword:00000001
"DisableSnapshot"=dword:00000001
string path = System.Environment.GetFolderPath(Environment.SpecialFolder.MyDocuments);
@Jacob-Tate
Jacob-Tate / pwsh Show all uninstall strings.ps1
Last active December 4, 2019 00:55
Use this to determine the uninstall strings for either a specific program, filter, or all programs
<#
.Synopsis
Gets the uninstall string for a program.
.Description
Gets the uninstall string for a program, can be filtered to a key word of the programs display name.
.Inputs
System.String
.Outputs
System.Management.Automation.PSCustomObject
# Recursively unblock all files
Get-ChildItem -Path . -Recurse | Unblock-File
# Open explorer.exe at the current working directory
Function explore {
"explorer.exe `"$(pwd)`"" | Invoke-Expression
}
# Mount network drive persistant with name "Z"
New-PSDrive -Name "Z" -PSProvider FileSystem -Root "\\unattended\install" -Persist
@Jacob-Tate
Jacob-Tate / reg Shell Extensions
Last active December 4, 2019 00:52
Value name(s): *
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
HKEY_USERS\%SID%\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\*
HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\*
HKEY_USERS\%SID%\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\*
HKEY_USERS\%SID%\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\*
@Jacob-Tate
Jacob-Tate / reg Service Control Manager
Last active December 4, 2019 00:52
Value name(s): ServiceControlManagerExtension
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\WOW