msdt-follina
msdt-follina copied to clipboard
Codebase to generate an msdt-follina payload
It keeps saying [!] error detering http hosting address. did you provide an interface or ip? when i try to do for example "python follina.py -c "notepad"
Traceback (most recent call last): File "/root/Desktop/msdt-follina/follina.py", line 63, in main serve_host = ipaddress.IPv4Address(args.interface) File "/usr/lib/python3.9/ipaddress.py", line 1307, in __init__ self._ip = self._ip_int_from_string(addr_str) File "/usr/lib/python3.9/ipaddress.py", line 1194, in _ip_int_from_string raise...
How to add text or any content in the maldoc generated file and send it to the victim.

pls help
the revers connection dosen't work alot of times sometime it work but alot of time it dosent
Reverse shell command requires new port every time you run the code. I needed to change it like 5 times. + I tried it on my windows 11 virtual machine...
I'm getting an error on my server when opening the malicious document on the target device. I'm not particularly familiar with Python, so there may be something basic I'm missing....