Noxtal / follinaView external linksLinks
All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.
☆22Aug 6, 2022Updated 3 years ago
Alternatives and similar repositories for follina
Users that are interested in follina are comparing it to the libraries listed below
Sorting:
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Mar 13, 2022Updated 3 years ago
- Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go☆18Jun 1, 2022Updated 3 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Sep 4, 2021Updated 4 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆21Aug 29, 2022Updated 3 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 6 months ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool☆41Dec 5, 2025Updated 2 months ago
- SpyStroke is an advanced and lightweight keylogger designed for ethical hacking and cybersecurity research. It captures keystrokes silent…☆14Jul 28, 2025Updated 6 months ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Static and Dynamic Analysis of Malware Samples☆12Mar 12, 2020Updated 5 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated last month
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- ☆14Mar 20, 2025Updated 10 months ago
- 漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell☆13Mar 1, 2021Updated 4 years ago
- Linux kernel LPE practice with an NPD vulnerability☆36Jul 11, 2023Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- This is Growtopia stealer save.dat file, Discord Webhook sends a file, mac address, IP info, city, and more...☆34Aug 18, 2021Updated 4 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- replace the shellcode chatacters so that reduce the entropy☆18Sep 14, 2023Updated 2 years ago
- Multifunctional keylogger using WinAPI and libcurl☆16Sep 9, 2021Updated 4 years ago
- Like Hell's Gate but more EGG :)☆20Mar 11, 2022Updated 3 years ago
- Oracle WebLogic CVE-2022-21371☆19Aug 31, 2022Updated 3 years ago
- CVE-2025-31324, SAP Exploit☆23Apr 28, 2025Updated 9 months ago
- Tool to automate the whole process of environment in android audits☆14Apr 30, 2019Updated 6 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 2 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Sep 7, 2024Updated last year
- A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.☆116Jan 31, 2025Updated last year
- ☆21Nov 6, 2024Updated last year
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25May 6, 2025Updated 9 months ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Jun 4, 2018Updated 7 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Feb 14, 2022Updated 4 years ago