Created
November 7, 2022 15:00
-
-
Save IamFaizanKhalid/79130f4b6e9c143aadfe8b76a1c1fef4 to your computer and use it in GitHub Desktop.
Script to access files in a USB drive, hidden by the malicious shortcut creating malware on another PC behind a shortcut.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo | |
title USB Shortcut File Reovery - Faizan Khalid | |
cls | |
echo Enter the USB Drive Letter (e.g. F): & set /p Drive= | |
cls | |
echo Recovering Files.. | |
attrib -h -r -s %Drive%:*.* /s /d | |
attrib +s +h "%Drive%:System Volume Information" /s /d | |
cls | |
echo Done! | |
pause >> nul |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment