Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/AgentRev/WindowsAppsUnfukker
PowerShell script to fix WindowsApps-related permission errors and crashes.
https://github.com/AgentRev/WindowsAppsUnfukker
microsoft-store powershell uwp-apps windows-10-apps
Last synced: 8 days ago
JSON representation
PowerShell script to fix WindowsApps-related permission errors and crashes.
- Host: GitHub
- URL: https://github.com/AgentRev/WindowsAppsUnfukker
- Owner: AgentRev
- License: unlicense
- Created: 2021-11-11T04:56:34.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2024-03-28T04:32:58.000Z (8 months ago)
- Last Synced: 2024-08-01T12:23:36.690Z (3 months ago)
- Topics: microsoft-store, powershell, uwp-apps, windows-10-apps
- Language: PowerShell
- Homepage:
- Size: 30.3 KB
- Stars: 356
- Watchers: 16
- Forks: 20
- Open Issues: 24
-
Metadata Files:
- Readme: README.md
- License: LICENSE.txt
Awesome Lists containing this project
README
# WindowsAppsUnfukker - [Download here](https://github.com/AgentRev/WindowsAppsUnfukker/archive/refs/heads/main.zip)
![The parameter is incorrect](https://i.imgur.com/ygnGtJE.png)
Are you getting "The parameter is incorrect" errors when trying to run apps?
Are Microsoft Store, Xbox, and other apps refusing to open or install?
Are you getting access denied errors with a bunch of apps?
Then boy do I have a solution for you!Use this script to whip WindowsApps into submission and finally get rid of these goddamn issues!
Seriously Microsoft, why the fuck is this crap so extremely convoluted?
I bet my ass some NTFS nerd creamed his pants at your office while building your steaming pile of permissions garbage.Jesus Fucking Christ.
---
### How to start the motherfukker1. Download the script [here](https://github.com/AgentRev/WindowsAppsUnfukker/archive/refs/heads/main.zip)
2. Download [PAExec](https://www.poweradmin.com/paexec/)
3. Open CMD as admin (the real CMD, not PowerShell), then access its folder: `cd PAEXEC_PATH_HERE`
4. Adjust `FULL_PATH_HERE` and execute the script:
```
paexec -s -i cmd /C powershell -ExecutionPolicy Bypass -File "FULL_PATH_HERE\WindowsAppsUnfukker.ps1" "%LocalAppData%" ^|^| pause
```
(If it says exit code -196608, it means the absolute path is invalid, double-check the `-File` path you entered)---
Note: If your objective is to modify files inside an app folder, I don't provide any assistance for that use-case, but there is an extra step required after running the script. You have to rename the app folder by adding `-old` at the end, make a copy of the folder, and rename the copy back to the original name. This will allow you to modify the files inside if they are not [encrypted](https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cipher). I don't why "Full control" permissions alone aren't sufficient, probably just [Microsoft eating a bag of dicks](https://www.youtube.com/watch?v=Gksc2aR2KCk) as usual. Some app folders are actually read-only Xbox Virtual Disk (XVD) images mounted at the driver level, so don't bother touching those.