An open API service indexing awesome lists of open source software.

https://github.com/waived/lnk-sploit

Smartscreen.exe MOTW bypass via three distinct LNK exploits
https://github.com/waived/lnk-sploit

lnk-exploit lnk-stomping motw-bypass silent-execution smartscreen-bypass smartscreenbypass trojan-downloader

Last synced: 4 months ago
JSON representation

Smartscreen.exe MOTW bypass via three distinct LNK exploits

Awesome Lists containing this project

README

        

////////////////////////////
LNK SPLOIT V1.0
////////////////////////////

Thank you for using LNK-Sploit!
---------------------------------------------------------------------------------------
Objective:
Bypass Windows MOTW (Mark of the Web) regulated by Windows SmartScreen.
Each malicious .lnk shortcut file this program generates will act as a
trojan downloader. It will silently download and execute a payload of the
user's choice. It is recommended that any payload downloaded/executed has
some sort of instance control (ex- process Mutex) in the event the victim
spam-clicks the .lnk file out of frustration, confusion, etc.
---------------------------------------------------------------------------------------
Technical information:
Payload customization lies mainly within two categories:
1) FILENAME: customized filename upon download

2) LOCATION: the payload can be downloaded to these directories:
- Downloads
- Favorites
- Application Data
- Temporary Files
- User Profile
---------------------------------------------------------------------------------------
Responsible use:
By downloading, modifying, distributing, or using this program, the end-user
agrees to the included legal statement outline in the included LEGAL.txt file.