💾 Click the floppy disk or package (for third party scripts) 📦 icons to download the ZIPped sources
❔ Click the question mark icons to view the MD5 and SHA1 checksums for the ZIPped sources
|Batch file examples|
|💾||❔||Name||Version||Description||OS (1)||Last modified||Remarks|
|💾||❔||Obscure.bat||1.00||Obscure URLs by converting host names to decimal IP addresses and by adding a fake host name as logon name||NT||2003-05-18||Also available as Perl and Rexx scripts.
Batch version is limited to IP addresses 0.0.0.0 through 127.255.255.255; for higher IP addresses the batch file will prompt you to manually add 2 decimal numbers.
|💾||❔||OpenAs.bat||1.01||Open Windows' "Open As" dialog for a specified file||NT||2002-06-20|
|💾||❔||OUMember.bat||1.03||Displays the members of the specified OU(s).||W2K||2004-11-03||Requires Windows Server 2003's DS Tools.|
|💾||❔||Own.bat||Recursively take ownership of specified directory tree||W2K||2014-10-01||Requires TAKEOWN.
The previous incarnation of this script was published 2002-09-30. I would not recommend using scripts that old anymore. However, a security vulnerability disclosure on http://www.thesecurityfactory.be/command-injection-windows.html used this script as an example of vulnerable code, so I updated the code, leaving the vulnerable code in comments for learning purposes.
|💾||❔||Owner.bat||1.00||Display the owner of specified file(s)||W2K||2002-02-03|
|Notes:||(1)||Operating System version these batch files were written for|
|All||No version specific commands are used, though it is (obviously) not tested with every DOS version available|
|95||Windows 95 (and probably Windows 98 as well)|
|DOS3||MS-DOS 3 and 4|
|DOS6+||MS-DOS 6 and later|
|NT||Windows NT 4 and later|
|NT4||Windows NT 4 (Windows NT 4 Terminal Server Edition too)|
|W2K||Windows 2000 and later|
|W2K3||Windows Server 2003|
|W2K8||Windows Server 2008|
|W2K8R2||Windows Server 2008 Release 2|
|TS||Windows NT 4 Terminal Server Edition, or Windows Server 200* with Terminal Services|
page last modified: 2023-11-17