The Powershell below, calls all of the tools listed for it here.
#begin script if (([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { "Running elevated; good." "" } else { "Not running as elevated. Starting elevated shell." Start-Process powershell -WorkingDirectory $PWD.Path -Verb runAs -ArgumentList "-noprofile -noexit -file $PSCommandPath" return "Done. This one will now exit." "" } Set-ExecutionPolicy Bypass -Scope Process -Force [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls -bor [Net.SecurityProtocolType]::Tls11 -bor [Net.SecurityProtocolType]::Tls12; $dfolder = "C:\OptimizeTemp" $ps_script_list = @( 'mma-appx-etc.ps1', 'RunDevNodeClean.ps1', 'wt_removeGhosts.ps1', 'TweakDrives.ps1', 'TweakSMB.ps1', 'OWTAS.ps1', 'OVSS.ps1', 'CATE.ps1', 'TweakHardware.ps1' 'TweakMemTCP.ps1' ) mkdir $dfolder "Downloading..." ForEach ($ps_script in $ps_script_list) { $download_url = "https://github.com/jebofponderworthy/windows-tools/raw/master/tools/$ps_script" "" "--- Downloading $ps_script... ---" Invoke-WebRequest -Uri $download_url -Outfile "$dfolder\$ps_script" } "" "Running..." ForEach ($ps_script in $ps_script_list) { $run_script = "$dfolder\$ps_script" & $run_script Remove-Item "$dfolder\$ps_script" } Remove-Item $dfolder -Recurse -Force #end of script