Merry Christmas

May the peace and blessings of Christmas be yours and may the coming year be filled with happiness and success.


Winja 5.0 finally released

This version required a lot of time to be ready for release, mostly because of a lack of time. Winja and other freeware have low priority for development and coding. For the last two years, I’ve been overwhelmed by other projects for my company. To be more productive, I have created two large frameworks which are now tested on Winja:

  • Phrozen Engine: A set of modern visual components which reproduce several options offered by the famous CSS through Browser Graphical Engine. Phrozen Engine is mostly coded using GDI/GDI+ and Direct2D. Since they are native, applications don’t require any additional frameworks to be run, and are produced lightweight.
  • Phrozen System: A set of components that interact directly with the system (User Level) and graft to the Phrozen Engine.

For the moment, only three big components have been used and tested: VirusTotal Uploader, Networking Process and HTTP Transmission (Download ...


Shortcuts as entry points for Malware part 3

In this last research on Windows shortcuts, we will demonstrate another sneaky technique to inject any kind of file without any limits on file size. 

The goal, again, is to demonstrate the real dangers of .LNK files (Microsoft Shortcuts), which are wrongly considered to be safe by common users.

A little reminder: a Windows shortcut is a binary file with the extension .LNK (Link File). Shortcuts are generally used to redirect one file to another, such as launching a program from your Desktop that is installed elsewhere on your system.

Less frequently, as we discussed in one of our previous papers, you can also execute shell commands through the shortcut, a good feature for users to create little automated tasks - but also an opportunity for hackers.

For whatever reason, Microsoft has also made any icons you can find on your system easy to usurp, so you can make the ...


Portal updated to v3.0

New web site

We are pleased to present you the version 3 of our official website.


  • Backend migration from PHP to Python.
  • Software (and new versions) distribution improved.
  • Overall website simplified (user experience and administration).
  • Web server migration from Apache to Nginx.

Coming articles

  • New version of the article “Shortcuts as entry points for Malware part 3”
  • .BAT (Windows Batch) files as Malware host (Dropper)
  • Clean install of Windows 10 — Improve the overall privacy and security.

Coming updates

  • Winja 4.2
  • Windows Privacy Tweaker 4.0
  • Who Stalks My Cam 4.0
  • Unnamed Malware Scanner (Merge RunPE detector, ADS Revealer, Shortcut Scanner and new techniques) 

Notice: Who Stalks My Cam is temporary removed from our Software collection until new version is ready. 

Feel free to share your feelings and follow us on our social networks to stay tuned about our progress.


Shortcuts as entry points for malware part 2

It was only yesterday that we reported about a way of infecting Microsoft Windows users by using a simple shortcut trick with the BITSAdmin Tool to download and execute a remote application.

If you haven’t already read the article, please click here.

The main issue with the first example is that your firewall could potentially block the download attempt since it requires a remote http/https connection to download the file before its execution.

We found another sneaky way of exploiting the Windows shortcut with a new 0day by embedding any files (such as application files) directly inside the shortcut itself.

Yes! the application is inside the windows shortcut

This makes the malicious application fully undetectable by any antivirus software before it will be dropped and executed.

Note: An an example, in the PoC mentioned below, we decided to use this vulnerability as a file dropper, but we could ...