/FollinaExtractor

Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files

Primary LanguagePython

FollinaExtractor

Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files

usage: extract_follina.py -f C:\path\to\file.rtf