msdt-follina
msdt-follina copied to clipboard
Codebase to generate an msdt-follina payload
I think this may have been patched. DOC opens but no payload. Tell me if I am wrong here.
after executing the document, the msdt tool is asking for passkey, which is why the exploit is facing issues to get the desired output. Any workaround ?
~/msdt-follina $ python3 follina.py Traceback (most recent call last): File "/data/data/com.termux/files/home/msdt-follina/follina.py", line 8, in import netifaces ModuleNotFoundError: No module named 'netifaces'
Hi I tested the exploit in the home environment by using Xampp web server with HTML script at Localhost location. The document is opened with the Word notification: "This document...
Can we use the malicious word document and bypass Windows Defender ?
I tried the exploit but and i have a question now : The exploit is done when the Windows Defender is off. dose it that means the vulnerability still exists...
First of all: thanks for your work, been a subscriber to your YouTube for quite some time now and highly enjoy it. This is the reason why I immediately needed...
Is there a way to set the contents of the file so that it is not just blank? Is there a way to convert an existing file to a corrupted...
According to `Readme.md` you should be able to get a reverse shell just by running `python3 follina.py -r 9001`, this didn't work for me and i had to manually download...
can we test this exploit on a real machine will it harm my system