A lightweight, powerful PowerShell utility with a modern WPF interface to organize, clean, and manage the Windows "Right Click > New" context menu.
Is your "New" menu cluttered with files you never create? Clean it up instantly.
This tool scans the Windows Registry (HKCU & HKLM) for all file extensions registered in the "ShellNew" subsystem. It allows you to toggle them on/off instantly or permanently delete them.
- 🎨 Modern UI & Theme Engine: Automatically detects your Windows System Theme (Dark/Light Mode) and adjusts the interface colors accordingly.
- 🔇 Silent Mode: Designed for speed. Toggles, deletions, and blocks happen instantly without annoying "Are you sure?" popups.
- 🛡️ Persistence Lock (Block Feature):
- Some apps recreate their menu items when updated or opened.
- Solution: Right-click an item and select "Block". This modifies the Registry ACL (Permissions) to
Denyaccess, effectively preventing the app from adding the item back.
- ➕ Template Manager: Easily add your own custom file templates (e.g.,
.py,.js,.md) to the menu using a simple file picker. - 🚀 Native PowerShell: No external dependencies or DLLs required. Runs on standard Windows installations.
- OS: Windows 10 or Windows 11.
- Runtime: PowerShell 5.1 (Pre-installed on Windows) or PowerShell 7+.
#Exe:
- Download the latest
NewMenuEditor.exefrom the Releases Page. - Right-click aand Run as Administrator.
#PS1:
- Download the latest
NewMenuEditor.ps1from the Source Code. - Right-click the file and select Run with PowerShell.
- Note: The tool requires Administrator privileges to modify HKLM keys. It will auto-request elevation if started as a standard user.
Note: If you run into execution policy errors, open PowerShell as Admin and run:
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass.
You may notice that some antivirus engines (such as Windows Defender, SentinelOne, or CrowdStrike) flag the .exe release of this tool as suspicious (e.g., Trojan:Win32/Wacatac, MachineLearning/Anomalous, or Generic.Malware).
This is a known False Positive.
This application is originally a PowerShell script converted into an executable (.exe) to make it easier to run. Modern antivirus "AI" and "Heuristic" engines often aggressively block any unsigned program that executes PowerShell commands internally, classifying them as "droppers" or "loaders" by default, even if the code itself is completely safe.
Since this project is open-source, you do not have to use the EXE file.
If your antivirus blocks the executable or if you prefer full transparency, you can run the source script directly:
-
Download the
.ps1file from this repository. -
Right-click the file and select Run with PowerShell.
-
(Note: You may need to enable script execution by running
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUserin PowerShell once).
We provide the compiled .exe solely for convenience (icon support, double-click execution). The code logic is identical to the .ps1 script.
The tool looks for ShellNew keys in:
HKEY_CLASSES_ROOT(Merged view)HKEY_CURRENT_USER\Software\ClassesHKEY_LOCAL_MACHINE\Software\Classes
When you toggle an item OFF, the tool renames the registry key from ShellNew to _ShellNew_Disabled. This preserves the data while hiding it from Windows Explorer. Toggling it ON reverses this process.
The "Block" feature creates an empty key and sets the Access Control List (ACL) to Deny Everyone. This creates a "dead zone" in the registry that installers cannot overwrite.
This tool modifies the Windows Registry. While it includes safety checks (renaming instead of deleting by default), use it at your own risk.
This project is licensed under the MIT License.
Created by @osmanonurkoc

