analyzing-windows-lnk-files-for-artifacts
0
Parse Windows LNK shortcut files to extract target paths, timestamps, volume information, and machine identifiers for forensic timeline reconstruction.
Install this skill
Run this command in your terminal. No account required — it auto-detects your AI tool and installs the skill file.
npx @skills-hub-ai/cli install cybersecurity-skills-analyzing-windows-lnk-files-for-artifactsOr download directly:
View all CLI commands →Setup by platform
Instructions
Security
Loading security scan...