Skip to content

amitniz/follina_cve_2022-30190

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

follina_cve_2022-30190

A proof of concept to CVE-2022-30190 (follina).

usage: exploit.py [-h] [-u HOST_IP] [-p PORT] [-o OFILE] [-m {server, create}]
                  [-s {script | script_file.ps1}] [-r HOST_IP:PORT]

Follina Exploitation Toolkit

options:
  -h, --help            show this help message and exit
  -u HOST_IP, --host HOST_IP
                        host ip address
  -p PORT, --port PORT  host port
  -o OFILE, --output OFILE
                        output file
  -m {server, create}, --mode {server, create}
                        operation mode - create doc file, run a server or both
  -s {script | script_file.ps1}, --script {script | script_file.ps1}
                        PS script for execution.
  -r HOST_IP:PORT, --remote HOST_IP:PORT
                        get a remote shell

disclaimer!: This tool was build for educational purposes only.

Releases

No releases published

Packages

No packages published