strayge / pylnk
Python library for reading and writing Windows shortcut files (.lnk). Python 3 only.
☆82Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for pylnk
- Windows Shortcut file (LNK) parser☆71Updated 5 months ago
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆193Updated last year
- ☆169Updated 2 months ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆90Updated 2 years ago
- ☆91Updated 2 years ago
- C# Utilities for Windows Notification Facility☆124Updated 6 months ago
- A small tool that allows to run WinAPI functions through command line parameters☆176Updated 2 years ago
- ☆101Updated 9 months ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆6Updated 2 years ago
- Offensive tool to trigger network authentications as SYSTEM☆138Updated 2 years ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆17Updated 4 months ago
- Start new PowerShell without etw and amsi in pure nim☆158Updated 2 years ago
- Retrieve inner payloads from Donut samples☆81Updated 8 months ago
- D/Invoke implementation in Nim☆98Updated 2 years ago
- subTee gists code backups☆37Updated 6 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆73Updated 3 months ago
- A port scanner written purely in PowerShell.☆76Updated last year
- Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules.☆138Updated 3 years ago
- InfoSec Notes☆53Updated 7 months ago
- A list of all the DLLs export in C:\windows\system32\☆211Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆149Updated 2 years ago
- Tools helpful for malware analysis☆22Updated 2 months ago
- PowerShell Obfuscation and Data Science☆172Updated 2 years ago
- code for the Proxy DLL example blog post☆58Updated 3 years ago
- Lnk Explorer Command line edition!!☆275Updated 4 months ago
- Lazarus analysis tools and research report☆55Updated 10 months ago
- Stop Windows Defender using the Win32 API☆190Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆34Updated last year
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆115Updated 2 years ago