You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Parse and extract Windows shortcut (.lnk) files using Eric Zimmerman's LECmd. Covers CLI flags, output formats (CSV/JSON/XML/HTML), removable drive filtering, and output field reference.
metadata
tool-name
tool-vendor
LECmd
Eric Zimmerman
LECmd Skill
LECmd is Eric Zimmerman's command-line tool for parsing Windows shortcut (.lnk) files. It extracts target file metadata, timestamps, volume information, network paths, and embedded tracker data into structured output. Forensic interpretation of LNK data (user activity reconstruction, file access analysis, etc.) belongs in a separate analysis skill.
Single-letter options use a single dash (-). Multi-character options use double dashes (--).
Input (one required)
Flag
Description
-f
Single .lnk file to process
-d
Directory to recursively process for .lnk files
Output Formats
Flag
Description
--csv
Directory to write CSV output
--csvf
Custom filename for CSV output (overrides default)
--json
Directory to write JSON output
--xml
Directory to write XML output
--html
Directory to write XHTML output
It's recommended to specify at least one output format to write results to a file. Forensic output can be very large and may consume the context window. CSV is the most common choice for analysis with Timeline Explorer or Excel.
Options
Flag
Description
Default
-r
Only process .lnk files pointing to removable drives
FALSE
-q
Suppress per-file output; show only filename being processed
FALSE
--all
Process all files in directory, not just files matching *.lnk
FALSE
--nid
Suppress Target ID list details from being displayed
FALSE
--neb
Suppress Extra blocks information from being displayed