关联漏洞
            
        
            描述
            proof of concept to CVE-2022-30190 (follina)
        
        
            介绍
            # follina_cve_2022-30190
A proof of concept to CVE-2022-30190 (follina).
```
usage: exploit.py [-h] [-u HOST_IP] [-p PORT] [-o OFILE] [-m {server, create}]
                  [-s {script | script_file.ps1}] [-r HOST_IP:PORT]
Follina Exploitation Toolkit
options:
  -h, --help            show this help message and exit
  -u HOST_IP, --host HOST_IP
                        host ip address
  -p PORT, --port PORT  host port
  -o OFILE, --output OFILE
                        output file
  -m {server, create}, --mode {server, create}
                        operation mode - create doc file, run a server or both
  -s {script | script_file.ps1}, --script {script | script_file.ps1}
                        PS script for execution.
  -r HOST_IP:PORT, --remote HOST_IP:PORT
                        get a remote shell
```
**disclaimer!**: This tool was build for educational purposes only.
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/3f6362c3ef8ca122d4e7c30b2fc4189eae920e5c
├── [5.0K]  exploit.py
├── [1.0K]  LICENSE
├── [ 888]  README.md
├── [4.0K]  scripts
│   ├── [ 38K]  nc.exe
│   └── [ 328]  remote_shell.ps1
└── [4.0K]  template
    ├── [1.4K]  [Content_Types].xml
    ├── [4.0K]  docProps
    │   ├── [ 711]  app.xml
    │   └── [ 739]  core.xml
    ├── [4.0K]  _rels
    └── [4.0K]  word
        ├── [3.9K]  document.xml
        ├── [4.0K]  embeddings
        │   └── [2.5K]  oleObject1.bin
        ├── [1.6K]  fontTable.xml
        ├── [4.0K]  media
        │   └── [ 188]  image1.emf
        ├── [4.0K]  _rels
        │   └── [1.1K]  document.xml.rels
        ├── [3.0K]  settings.xml
        ├── [ 29K]  styles.xml
        ├── [4.0K]  theme
        │   └── [6.6K]  theme1.xml
        └── [ 894]  webSettings.xml
9 directories, 17 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。