shiny-laboratory / Lnk-exploit

🌐An lnk exploit (fake txt) for starting files with other extensions silently. Works on Windows 7 or higher

Home Page:https://t.me/shinyenigma

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Lnk exploit builder for Windows

The exploit generates a fake .txt file with a backdoor. The main idea is executed an exe/bat file without user knowing about it. DM to my telegram to buy: @shinyenigma

1) What does the user see before launching the file (file extension view is enabled):

image

2) What does the user see after launching the file:

image

3) What exactly happens:

The .lnk invokes a hidden powershell console ➡️ The powershell script downloads/create a txt file with the same name and opens it in Notepad + downloads,saves and starts the exe file you`ve binded

Features:


✅NEW: additional link encoding and obfuscating
✅Easy-to use builder
✅Fake description generator
✅Hiding the backdoor code deep inside the binary. It is impossible to see the file content in the properties string (see the screenshot below)
✅Txt downloading option for long text files
✅Silent powershell console on background
✅Anti-analyzing - any change of properties will turn the infected file into a harmless one, all the malicious code will be destroyed
✅Bypassing Windows SmartScreen alert (the application will be started by another (trusted) application)
✅Windows Defender doesn`t block or delete the generated file

Extra Screenshots:

Builder:

image

Properties window of an infected file, the "Target" string look like it would be empty:

image

🛑Disclaimer: I don`t take the resposiblity for any illegal actions realized with the help of this tool, it was made for educational purposes, testing or cybersecurity researchs. Please, be nice