cve-2022-30190
Here are 14 public repositories matching this topic...
Proof of Concept of CVE-2022-30190
-
Updated
Oct 6, 2022 - Python
Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)
-
Updated
Jun 16, 2022 - Python
A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)
-
Updated
Sep 13, 2022 - Go
Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go
-
Updated
Jun 1, 2022 - Go
Remote Access Shell for Windows (based on cve-2022-30190)
-
Updated
Feb 9, 2024 - Python
Server to host/activate Follina payloads & generator of malicious Word documents exploiting the MS-MSDT protocol. (CVE-2022-30190)
-
Updated
Jun 14, 2022 - Java
Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE-2022-30190.
-
Updated
Jun 8, 2022
An NSIS script that helps deploy and roll back the mitigation registry patch for CVE-2022-30190 as recommended by Microsoft
-
Updated
Jun 1, 2022 - NSIS
A very simple MSDT "Follina" exploit **patched**
-
Updated
Nov 1, 2022 - HTML
proof of concept to CVE-2022-30190 (follina)
-
Updated
Jun 11, 2022 - Python
An Unofficial Patch Follina CVE-2022-30190 (patch) by micrisoft Guidelines.
-
Updated
Jun 14, 2022 - Batchfile
A simple Follina RTF and DOCX generator
-
Updated
Jul 12, 2022 - Python
Improve this page
Add a description, image, and links to the cve-2022-30190 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cve-2022-30190 topic, visit your repo's landing page and select "manage topics."