By putting conflicting metadata in LNK files, a researcher found four new ways to spoof targets, hide arguments, and run unintended programs in Windows Explorer.
Check if a file is really a file, whether a string contains anything, and whether you can run a program with these vital patterns.