Releases: kacos2000/Jumplist-Browser
JumplistBrowser
JumplistBrowser
JumplistBrowser
JumplistBrowser
JumplistBrowser
[Update]
-
Added option to 'Open File With' for examination of the selected file with other tools like a Hex Editor
[Note]: Be very careful when dealing with possible malicious LNK files !! -
Added option to copy the Selected file's Full File path
-
Updated the LNK Slack parts
-
Minor correction (copy paste mishap)
MD5: A9E0BAB2F1A3E45C35C8E5D53D6A387D
SHA256: 6526C557D3B354A81BC9EE88EEEC9BABB141B279BC5DC07B73A3368A4711A729
JumplistBrowser
[Update]
-
Added Tooltip on the 'Command Arguments' split per 100 characters eg:
-
Will show LNK Slack if it exists, allowing copy of the Hex Code
-
Other minor updates
Note *1: The Slack size = the actual LNK Filesize - the Shotcut Size (Total of the LNK block sizes)
When copying either the 'Command Arguments' or the 'Link Slack', I suggest pasting to Notepad first and inspect before doing anything else.
MD5: 4B14FB429A22A7E793517FE9DDEECFEC
SHA256: C1CD6A1531EFB6CA6FA351695DD0E03482003DA6A938DBE0C3C30B26CD593CCC
JumplistBrowser (x64)
[Update]
- Minor update
MD5: 463B68957B29A8F24AD3B868A5772634
SHA256: 11B66D052EF44874E857A7B43951ED4DB538C76EED73D2F4CD2479E31C25FC5B
JumplistBrowser (x64)
[Update]
- Added ExtraData info from KnownFolderDataBlock, SpecialFolderDataBlock, EnvironmentVariableDataBlock, ConsoleDataBlock and ConsoleFEDataBlock
- Fixed issue with Knownfolder paths
- Other minor changes
MD5: 09050E1A385BF97AD3643D16C60CBC99
SHA256: 7B6847B90FC44C38021EF50ABB57C5983845A6C53AA8B5C76451782189261936
JumplistBrowser (x64)
[Update]
- Found a way to reverse the 'Knownfolder' replacement done by the ShellLink .Net lib, so LinkTargetID Name & Target Path should now appear correctly mostly (instead of being translated to local machine paths):
Display Name: notes.txt
Target Path: [MyDocuments]\notes.txt
[Known Issue]
- The 'Downloads' 'Knownfolder' still shows the current user's Downloads path (its not in the list of
[enum]::GetNames([System.Environment+SpecialFolder])
items)
[To Do]
- [ ] Manually parse 'LinkTargetIDLists'
MD5: EF847F994AE8403E6676618FA56BBA55
SHA256: 40D935DC64B2B5857671304A96130233A6F1BF01D12F5715255A7FA9909DBF61
JumplistBrowser (x64)
[Update]
-
Replaced 'Network Provider Types' from the ones listed here to this one which is more comprehensive (Curiously, 0x00020000, the most commonly used flag (LanMan) was omitted from the [ms-shllink] 'NetworkProviderType' documentation !!)
Example outputNetwork Provider Type: 0x00020000 (WNNC_NET_LANMAN)
-
New List:
Hex Value Vendor 00010000 WNNC_NET_MSNET 00020000 WNNC_NET_LANMAN 00030000 WNNC_NET_NETWARE 00040000 WNNC_NET_VINES 00050000 WNNC_NET_10NET 00060000 WNNC_NET_LOCUS 00070000 WNNC_NET_SUN_PC_NFS 00080000 WNNC_NET_LANSTEP 00090000 WNNC_NET_9TILES 000A0000 WNNC_NET_LANTASTIC 000B0000 WNNC_NET_AS400 000C0000 WNNC_NET_FTP_NFS 000D0000 WNNC_NET_PATHWORKS 000E0000 WNNC_NET_LIFENET 000F0000 WNNC_NET_POWERLAN 00100000 WNNC_NET_BWNFS 00110000 WNNC_NET_COGENT 00120000 WNNC_NET_FARALLON 00130000 WNNC_NET_APPLETALK 00140000 WNNC_NET_INTERGRAPH 00150000 WNNC_NET_SYMFONET 00160000 WNNC_NET_CLEARCASE 00170000 WNNC_NET_FRONTIER 00180000 WNNC_NET_BMC 00190000 WNNC_NET_DCE 001A0000 WNNC_NET_AVID 001B0000 WNNC_NET_DOCUSPACE 001C0000 WNNC_NET_MANGOSOFT 001D0000 WNNC_NET_SERNET 001E0000 WNNC_NET_RIVERFRONT1 001F0000 WNNC_NET_RIVERFRONT2 00200000 WNNC_NET_DECORB 00210000 WNNC_NET_PROTSTOR 00220000 WNNC_NET_FJ_REDIR 00230000 WNNC_NET_DISTINCT 00240000 WNNC_NET_TWINS 00250000 WNNC_NET_RDR2SAMPLE 00260000 WNNC_NET_CSC 00270000 WNNC_NET_3IN1 00290000 WNNC_NET_EXTENDNET 002A0000 WNNC_NET_STAC 002B0000 WNNC_NET_FOXBAT 002C0000 WNNC_NET_YAHOO 002D0000 WNNC_NET_EXIFS 002E0000 WNNC_NET_DAV 002F0000 WNNC_NET_KNOWARE 00300000 WNNC_NET_OBJECT_DIRE 00310000 WNNC_NET_MASFAX 00320000 WNNC_NET_HOB_NFS 00330000 WNNC_NET_SHIVA 00340000 WNNC_NET_IBMAL 00350000 WNNC_NET_LOCK 00360000 WNNC_NET_TERMSRV 00370000 WNNC_NET_SRT 00380000 WNNC_NET_QUINCY 00390000 WNNC_NET_OPENAFS 003A0000 WNNC_NET_AVID1 003B0000 WNNC_NET_DFS 003C0000 WNNC_NET_KWNP 003D0000 WNNC_NET_ZENWORKS 003E0000 WNNC_NET_DRIVEONWEB 003F0000 WNNC_NET_VMWARE 00400000 WNNC_NET_RSFX 00410000 WNNC_NET_MFILES 00420000 WNNC_NET_MS_NFS 00430000 WNNC_NET_GOOGLE 00440000 WNNC_NET_NDFS
MD5: 46387B795FB5BECB5216C1751BADAE59
SHA256: 561D1C82742247A2E282081BCEB222E41F93B97BD08B46151258C460FC1DAA8B