hoihosick/lnk_mcp_server
3.2
If you are the rightful owner of lnk_mcp_server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
E01 LNK MCP Server is designed for digital forensics, focusing on extracting and parsing Windows shortcut (LNK) artifacts from E01 disk images.
Tools
Functions exposed to the LLM to take actions
scan_lnk_in_e01
Searches for all LNK files within the E01 image.
extract_lnk_by_inode
Extracts specific LNK files based on inode.
parse_lnk
Parses detailed metadata from LNK files.
auto_extract_and_parse_lnk
Automates the search, extraction, and parsing of LNK files.
extract_lnk_timeline
Performs timeline analysis of LNK files.
Prompts
Interactive templates invoked by user choice
No prompts
Resources
Contextual data attached and managed by the client