Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files
        
        
            # FollinaExtractor
Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files
usage: extract_follina.py -f C:\path\to\file.rtf
        
        
 [4.0K]  /data/pocs/6b58112e7fea7dff8ee80334298fe2ef43cb4f39
├── [1.3K]  extract_follina.py
└── [ 139]  README.md
0 directories, 2 files