Reference of code has been taken from https://github.com/JohnHammond/msdt-follina/blob/main/follina.py. I have given the explanation of the code and made the code a bit simplified.
-
Updated
Jun 7, 2022 - Python
Reference of code has been taken from https://github.com/JohnHammond/msdt-follina/blob/main/follina.py. I have given the explanation of the code and made the code a bit simplified.
proof of concept to CVE-2022-30190 (follina)
Server to host/activate Follina payloads & generator of malicious Word documents exploiting the MS-MSDT protocol. (CVE-2022-30190)
The Follina vulnerability in a Windows support tool can be easily exploited by a specially crafted Word document. The lure is outfitted with a remote template that can retrieve a malicious HTML file and ultimately allow an attacker to execute Powershell commands within Windows.
An Unofficial Patch Follina CVE-2022-30190 (patch) by micrisoft Guidelines.
A simple Follina RTF and DOCX generator
A very simple MSDT "Follina" exploit **patched**
Remote Access Shell for Windows (based on cve-2022-30190)
A proof of concept for CVE-2022-30190 (Follina).
Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go
A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)
Proof of Concept of CVE-2022-30190
Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)
POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
Add a description, image, and links to the follina topic page so that developers can more easily learn about it.
To associate your repository with the follina topic, visit your repo's landing page and select "manage topics."