Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files
# FollinaExtractor
Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files
usage: extract_follina.py -f C:\path\to\file.rtf
[4.0K] /data/pocs/6b58112e7fea7dff8ee80334298fe2ef43cb4f39
├── [1.3K] extract_follina.py
└── [ 139] README.md
0 directories, 2 files