关联漏洞
            
        
            描述
            Educational Follina PoC Tool
        
        
            介绍
            # Follina-CVE-2022-30190-Sample-by-ethical-blue
 Educational Follina Tool




# Version history
v1.1 — JavaScript payload obfuscation
v1.0 — Initial release
# Features
+ .RTF payload generator
+ Simple HTTP Server for payload
+ Mitigation tips
+ Configuration extractor
+ Easy to use for learning
## Exploit Executed Successfully

        
        文件快照
        
            
                
 [4.0K]  /data/pocs/8c28c4444259521678a0376733d683ec2f123df9
├── [3.3K]  app.manifest
├── [ 852]  App.xaml
├── [ 327]  App.xaml.cs
├── [ 595]  AssemblyInfo.cs
├── [4.0K]  Dark
│   ├── [ 11K]  Button.xaml
│   ├── [ 19K]  Common.xaml
│   ├── [8.9K]  RadioButton.xaml
│   ├── [4.4K]  TabControl.xaml
│   ├── [5.1K]  TabItem.xaml
│   └── [8.9K]  TextBox.xaml
├── [4.0K]  Files
│   ├── [2.5K]  JavaScript.txt
│   └── [8.7K]  RTF.txt
├── [2.2K]  FollinaExtractor.cs
├── [1.5K]  Follina_PoC.csproj
├── [ 414]  Follina_PoC.csproj.user
├── [1.1K]  Follina_PoC.sln
├── [4.0K]  _github_images
│   ├── [ 56K]  tool1.png
│   ├── [ 33K]  tool2.png
│   ├── [ 30K]  tool3.png
│   ├── [ 67K]  tool4.png
│   └── [498K]  tool-running.png
├── [4.0K]  Images
│   ├── [126K]  ethical.ico
│   ├── [102K]  scheme.png
│   └── [8.0K]  tube.png
├── [ 18K]  LICENSE
├── [ 10K]  MainWindow.xaml
├── [2.9K]  MainWindow.xaml.cs
├── [1.1K]  PayloadGenerator.cs
├── [ 685]  README.md
└── [1.3K]  WebServer.cs
4 directories, 30 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。