Agent Skills: analyzing-windows-lnk-files-for-artifacts

Parse Windows LNK shortcut files to extract target paths, timestamps, volume information, and machine identifiers for forensic timeline reconstruction.

UncategorizedID: plurigrid/asi/analyzing-windows-lnk-files-for-artifacts

Install this agent skill to your local

pnpm dlx add-skill https://github.com/plurigrid/asi/analyzing-windows-lnk-files-for-artifacts

Skill Files

Browse the full folder contents for analyzing-windows-lnk-files-for-artifacts.

Download Skill

Loading file tree…

Select a file to preview its contents.