msdt-follina icon indicating copy to clipboard operation
msdt-follina copied to clipboard

Codebase to generate an msdt-follina payload

Results 18 msdt-follina issues
Sort by recently updated
recently updated
newest added

I think this may have been patched. DOC opens but no payload. Tell me if I am wrong here.

after executing the document, the msdt tool is asking for passkey, which is why the exploit is facing issues to get the desired output. Any workaround ?

~/msdt-follina $ python3 follina.py Traceback (most recent call last): File "/data/data/com.termux/files/home/msdt-follina/follina.py", line 8, in import netifaces ModuleNotFoundError: No module named 'netifaces'

Hi I tested the exploit in the home environment by using Xampp web server with HTML script at Localhost location. The document is opened with the Word notification: "This document...

Can we use the malicious word document and bypass Windows Defender ?

I tried the exploit but and i have a question now : The exploit is done when the Windows Defender is off. dose it that means the vulnerability still exists...

First of all: thanks for your work, been a subscriber to your YouTube for quite some time now and highly enjoy it. This is the reason why I immediately needed...

Is there a way to set the contents of the file so that it is not just blank? Is there a way to convert an existing file to a corrupted...

According to `Readme.md` you should be able to get a reverse shell just by running `python3 follina.py -r 9001`, this didn't work for me and i had to manually download...

can we test this exploit on a real machine will it harm my system