A comprehensive mitigation and monitoring solution for the Microsoft Office MSDT Follina vulnerability (CVE-2022-30190).
-
MSDT Protocol Control
- Enable/Disable MSDT protocol handler
- Real-time status monitoring
-
MS Office Security Settings
- Monitor VBA macro settings
- Check internet content blocking settings
- Support for multiple Office versions
-
File Scanner
- Scan files for Follina exploit indicators
- MD5 hash verification
- Detailed threat reporting
-
Real-time Monitoring
- Monitor MSDT process calls
- Track suspicious activities
- Process information logging
- Python 3.7+
- Flask (Web Framework)
- Watchdog (File System Monitoring)
- psutil (Process Management)
- winreg (Registry Management)
- olefile (OLE File Analysis)
- React.js
- Material-UI Components
- Axios (HTTP Client)
- Core Security
- Windows Registry API
- OLE Object Analysis
- MD5 Hashing
- Base64 Detection/Decoding
- Windows Components
- MSDT Protocol Handler
- Windows Registry
- Process Management
- File System Events
- Environment
- Visual Studio Code
- Python Virtual Environment
- Git Version Control
- npm/yarn (Frontend Package Management)
- Windows 10/11
- Python 3.7+
- Microsoft Office (for Office settings monitoring)
- Administrative privileges (for MSDT control)
- Clone the repository:
git clone [repository-url]
- Create a virtual environment (recommended):
python -m venv venv
.\venv\Scripts\activate
- Install dependencies:
pip install -r requirements.txt
- Run the application:
python follina_mitigation.py
- Open your web browser and navigate to:
http://localhost:5000
- Use the web interface to:
- Control MSDT protocol
- Monitor Office security settings
- Scan suspicious files
- Enable real-time monitoring
- Keep Windows and Office up to date
- Enable Office security features:
- Set VBA macro warnings to highest level
- Enable content execution blocking from internet
- Use the real-time monitoring feature
- Regularly scan downloaded files
- Keep MSDT disabled when not needed
MIT License
This tool is for defensive purposes only. The authors are not responsible for any misuse or damage caused by this tool.