关联漏洞
描述
Educational Follina PoC Tool
介绍
# Follina-CVE-2022-30190-Sample-by-ethical-blue
Educational Follina Tool




# Version history
v1.1 — JavaScript payload obfuscation
v1.0 — Initial release
# Features
+ .RTF payload generator
+ Simple HTTP Server for payload
+ Mitigation tips
+ Configuration extractor
+ Easy to use for learning
## Exploit Executed Successfully

文件快照
[4.0K] /data/pocs/8c28c4444259521678a0376733d683ec2f123df9
├── [3.3K] app.manifest
├── [ 852] App.xaml
├── [ 327] App.xaml.cs
├── [ 595] AssemblyInfo.cs
├── [4.0K] Dark
│ ├── [ 11K] Button.xaml
│ ├── [ 19K] Common.xaml
│ ├── [8.9K] RadioButton.xaml
│ ├── [4.4K] TabControl.xaml
│ ├── [5.1K] TabItem.xaml
│ └── [8.9K] TextBox.xaml
├── [4.0K] Files
│ ├── [2.5K] JavaScript.txt
│ └── [8.7K] RTF.txt
├── [2.2K] FollinaExtractor.cs
├── [1.5K] Follina_PoC.csproj
├── [ 414] Follina_PoC.csproj.user
├── [1.1K] Follina_PoC.sln
├── [4.0K] _github_images
│ ├── [ 56K] tool1.png
│ ├── [ 33K] tool2.png
│ ├── [ 30K] tool3.png
│ ├── [ 67K] tool4.png
│ └── [498K] tool-running.png
├── [4.0K] Images
│ ├── [126K] ethical.ico
│ ├── [102K] scheme.png
│ └── [8.0K] tube.png
├── [ 18K] LICENSE
├── [ 10K] MainWindow.xaml
├── [2.9K] MainWindow.xaml.cs
├── [1.1K] PayloadGenerator.cs
├── [ 685] README.md
└── [1.3K] WebServer.cs
4 directories, 30 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。