nomisec
WORKING POC
394 stars
by komomon · client-side
https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed
This is a Python-based exploit for CVE-2022-30190 (Follina), which leverages a Microsoft Office MSDT vulnerability to achieve remote code execution via malicious Word documents. The script generates a weaponized .docx file that triggers arbitrary command execution or binary loading when opened.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Python 3.x · A template Word document (muban.docx) · Network access to the target
nomisec
WORKING POC
158 stars
by JMousqueton · client-side
https://github.com/JMousqueton/PoC-CVE-2022-30190
This repository contains a proof-of-concept exploit for CVE-2022-30190, a Microsoft Office RCE vulnerability (Follina) that leverages the MSDT URI scheme to execute arbitrary commands via malicious Word documents. The PoC includes a Python script to generate a malicious docx file and a payload HTML file that triggers the vulnerability.
Classification
Working Poc 95%
Target:
Microsoft Office (Word) with MSDT
No auth needed
Prerequisites:
Network access to the target · Target opens the malicious document · MSDT tool present on the target system
nomisec
WORKING POC
104 stars
by onecloudemoji · client-side
https://github.com/onecloudemoji/CVE-2022-30190
This repository contains a proof-of-concept exploit for CVE-2022-30190 (Follina), a Microsoft Office remote code execution vulnerability. The exploit involves hosting an HTML file on a local server and tricking a user into opening a malicious DOCX file, which then executes arbitrary code (e.g., launching calc.exe).
Classification
Working Poc 90%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Hosting exploit.html on a local server · Modifying the DOCX file to point to the exploit URL
nomisec
WORKING POC
60 stars
by doocop · poc
https://github.com/doocop/CVE-2022-30190
This repository contains a proof-of-concept for CVE-2022-30190, a Microsoft Office Word RCE vulnerability. The exploit leverages an external OLE object reference in a docx file to execute arbitrary code via the ms-msdt URI scheme.
Classification
Working Poc 90%
Target:
Microsoft Office Word
No auth needed
Prerequisites:
A vulnerable version of Microsoft Office Word · Ability to deliver a malicious docx file to the target
nomisec
WORKING POC
38 stars
by Malwareman007 · client-side
https://github.com/Malwareman007/Deathnote
This PoC exploits CVE-2022-30190 (Follina) by crafting a malicious Word document that triggers MS-MSDT via an external HTTP server. It supports arbitrary command execution or reverse shell payloads, leveraging PowerShell and base64 encoding to bypass restrictions.
Classification
Working Poc 95%
Target:
Microsoft Office (Word) with MS-MSDT
No auth needed
Prerequisites:
Network access to target · Victim opens malicious Word document · MS-MSDT protocol handler enabled
nomisec
WRITEUP
38 stars
by archanchoudhury · poc
https://github.com/archanchoudhury/MSDT_CVE-2022-30190
This repository provides a detailed analysis of CVE-2022-30190, including its timeline, detection strategies, and mitigation plans. It does not contain exploit code but offers IOCs and detection rules for security teams.
Classification
Writeup 100%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT) in Windows 7+ and Server 2008+
No auth needed
Prerequisites:
Victim opens a malicious Word document or previews it in Windows Explorer
nomisec
WORKING POC
33 stars
by Hrishikesh7665 · client-side
https://github.com/Hrishikesh7665/Follina_Exploiter_CLI
This repository contains a Python-based CLI tool for exploiting CVE-2022-30190 (Follina), a zero-day vulnerability in Microsoft Office's MSDT. It supports malicious command execution and reverse shell establishment via NetCat, with options for .doc, .docx, and .rtf file formats.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Python 3.10.4 · pyfiglet · network connectivity to target
nomisec
WORKING POC
31 stars
by MalwareTech · poc
https://github.com/MalwareTech/FollinaExtractor
This PoC extracts payload URLs from malicious docx and rtf files exploiting CVE-2022-30190 (Follina). It parses embedded URLs in document relationships or RTF objects, aiding in analysis of exploit documents.
Classification
Working Poc 100%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Malicious docx or rtf file exploiting CVE-2022-30190
nomisec
SCANNER
23 stars
by ErrorNoInternet · poc
https://github.com/ErrorNoInternet/FollinaScanner
This is a Go-based scanner tool designed to detect the presence of the Follina exploit (CVE-2022-30190) in Office documents by analyzing embedded URLs and checking for the 'ms-msdt' string in HTTP responses.
Classification
Scanner 100%
Target:
Microsoft Office documents (e.g., .docx)
No auth needed
Prerequisites:
Access to potentially malicious Office documents
nomisec
WORKING POC
22 stars
by Noxtal · client-side
https://github.com/Noxtal/follina
This is a functional PoC for CVE-2022-30190 (Follina), which exploits a remote code execution vulnerability in Microsoft Support Diagnostic Tools (MSDT) via malicious Office documents. The script generates a weaponized document and serves a payload to trigger arbitrary command execution.
Classification
Working Poc 95%
Target:
Microsoft Office (Word) with MSDT
No auth needed
Prerequisites:
Network access to the target · Victim interaction to open the malicious document
nomisec
WORKING POC
20 stars
by 0xflagplz · poc
https://github.com/0xflagplz/MS-MSDT-Office-RCE-Follina
This repository provides a detailed proof-of-concept for CVE-2022-30190, leveraging the MS-MSDT Follina vulnerability to achieve remote code execution via malicious Office documents. It includes step-by-step instructions for crafting exploit files and multiple payload examples.
Classification
Working Poc 95%
Target:
Microsoft Office (Word)
No auth needed
Prerequisites:
Ability to deliver malicious Office document · Network access to payload host
nomisec
WORKING POC
18 stars
by dwisiswant0 · poc
https://github.com/dwisiswant0/gollina
This is a Go-based PoC for CVE-2022-30190 (Follina), which exploits a remote code execution vulnerability in Microsoft Office via malicious Word documents. The tool generates a weaponized .docx file and hosts a server to deliver the payload.
Classification
Working Poc 95%
Target:
Microsoft Office (MS-MSDT)
No auth needed
Prerequisites:
Victim opens the malicious Word document · Network connectivity to the attacker's server
nomisec
WORKING POC
10 stars
by aminetitrofine · client-side
https://github.com/aminetitrofine/CVE-2022-30190
This repository contains a functional PoC exploit for CVE-2022-30190 (Follina), a Microsoft Office RCE vulnerability. The exploit generates a malicious Word document that triggers arbitrary command execution via MSDT when opened.
Classification
Working Poc 95%
Target:
Microsoft Office (2016 Pro tested)
No auth needed
Prerequisites:
Network connectivity to attacker-controlled server · Victim opens malicious Word document
nomisec
WORKING POC
8 stars
by Gra3s · client-side
https://github.com/Gra3s/CVE-2022-30190_EXP_PowerPoint
This PoC exploits CVE-2022-30190 (Follina) via a crafted PowerPoint (PPSX) file that loads a malicious HTML payload from a remote server. The exploit leverages the MSDT URL protocol handler to achieve remote code execution (RCE).
Classification
Working Poc 90%
Target:
Microsoft Office (PowerPoint) with MSDT
No auth needed
Prerequisites:
Attacker-controlled server to host exploit.html · Victim opens the malicious PPSX file
nomisec
WORKING POC
8 stars
by ar2o3 · poc
https://github.com/ar2o3/FollinaXploit
This repository contains a Python-based exploit for CVE-2022-30190 (Follina), a Microsoft Office MSDT vulnerability. It generates malicious Office documents (DOC, DOCX, RTF) that execute arbitrary commands or reverse shells via the MSProtocol URI scheme.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Python 3.10.4 · pyfiglet · network connectivity to attacker-controlled server
nomisec
WORKING POC
8 stars
by drgreenthumb93 · poc
https://github.com/drgreenthumb93/CVE-2022-30190-follina
This repository provides a PoC for CVE-2022-30190 (Follina), a vulnerability in Microsoft Support Diagnostic Tool (MSDT) that allows remote code execution via a malicious Word document. The exploit requires modifying the document's XML relationships file to include a malicious payload.
Classification
Working Poc 90%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Victim opens a malicious Word document · Network access to attacker-controlled server
nomisec
WORKING POC
7 stars
by DerZiad · client-side
https://github.com/DerZiad/CVE-2022-30190
This repository contains a Java-based Spring Boot application that generates malicious Office documents exploiting CVE-2022-30190 (Follina), a critical RCE vulnerability in Microsoft Office via the MSDT protocol. It provides a web interface for payload creation and Docker support for easy deployment.
Classification
Working Poc 95%
Target:
Microsoft Office (multiple versions)
No auth needed
Prerequisites:
Docker · Java 21 · Spring Boot · Target system with vulnerable Microsoft Office installation
nomisec
WORKING POC
7 stars
by sudoaza · client-side
https://github.com/sudoaza/CVE-2022-30190
This repository contains a Python script to generate a malicious Word document exploiting CVE-2022-30190 (MS-MSDT Follina). The exploit leverages a remote template injection to execute arbitrary code via PowerShell when the document is opened.
Classification
Working Poc 95%
Target:
Microsoft Office Word (multiple versions)
No auth needed
Prerequisites:
Python 3 · Target system with vulnerable Microsoft Office Word · Network access to host the malicious payload
nomisec
WORKING POC
6 stars
by PaddlingCode · poc
https://github.com/PaddlingCode/cve-2022-30190
This repository provides a PowerShell script to mitigate CVE-2022-30190 by removing the vulnerable 'ms-msdt' registry key. The script is a remediation tool rather than an exploit, but it directly addresses the vulnerability by disabling the attack vector.
Classification
Working Poc 90%
Target:
Microsoft Windows (ms-msdt)
Auth required
Prerequisites:
Administrative privileges to modify the Windows registry
nomisec
WORKING POC
6 stars
by ItsNee · poc
https://github.com/ItsNee/Follina-CVE-2022-30190-POC
This PoC exploits CVE-2022-30190 (Follina) by generating a malicious Word document that triggers remote code execution via a crafted URL. It includes a server to host the payload and demonstrates the vulnerability by launching calc.exe by default.
Classification
Working Poc 95%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT) via Microsoft Office
No auth needed
Prerequisites:
Python 3.x · Network access to the target · Target opens the malicious Word document
nomisec
WORKING POC
5 stars
by Cosmo121 · poc
https://github.com/Cosmo121/Follina-Remediation
This repository provides PowerShell scripts to detect and remediate CVE-2022-30190 (Follina) by removing the MSDT registry key. The scripts check for the presence of the vulnerable registry key and delete it to prevent exploitation.
Classification
Working Poc 90%
Target:
Microsoft Windows MSDT
Auth required
Prerequisites:
Administrative privileges to modify registry
nomisec
WORKING POC
5 stars
by AbdulRKB · poc
https://github.com/AbdulRKB/Follina
This PoC exploits CVE-2022-30190 (Follina) by generating a malicious Word document that triggers remote code execution via the MSDT URL protocol handler. It hosts a malicious HTML payload and sets up a netcat listener for a reverse shell.
Classification
Working Poc 95%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Python 3 · netifaces library · netcat · network connectivity to target
nomisec
WRITEUP
4 stars
by sentinelblue · poc
https://github.com/sentinelblue/CVE-2022-30190
This repository provides a detailed writeup and references for CVE-2022-30190, a remote code execution vulnerability in the Microsoft Support Diagnostic Tool (MSDT). It includes links to PoC repositories, mitigation guidance, and Microsoft Sentinel hunting queries for detection.
Classification
Writeup 100%
Target:
Microsoft Support Diagnostic Tool (MSDT) in Windows
No auth needed
Prerequisites:
Calling application such as Word to trigger the URL protocol handler
nomisec
WORKING POC
4 stars
by dsibilio · poc
https://github.com/dsibilio/follina-spring
This repository contains a Spring Boot application that generates malicious Word documents to exploit CVE-2022-30190 (Follina), a remote code execution vulnerability in Microsoft Windows Support Diagnostic Tool (MSDT). It provides both server-side and client-side payload delivery mechanisms.
Classification
Working Poc 95%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
A vulnerable version of Microsoft Windows with MSDT · Ability to deliver a malicious Word document to the target
nomisec
SCANNER
3 stars
by EkamSinghWalia · poc
https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-
This repository contains a PowerShell script to detect and mitigate the Follina MSDT vulnerability (CVE-2022-30190) by checking for the presence of the MSDT URL Protocol registry key and optionally disabling it. It also provides functionality to backup and restore the registry key.
Classification
Scanner 90%
Target:
Microsoft Windows with MSDT URL Protocol enabled
Auth required
Prerequisites:
Administrator privileges · PowerShell execution policy allowing script execution
nomisec
WORKING POC
3 stars
by SrikeshMaharaj · poc
https://github.com/SrikeshMaharaj/CVE-2022-30190
This repository contains a functional PoC for CVE-2022-30190, leveraging the MS-MSDT 'Follina' vulnerability to execute arbitrary commands via a malicious Word document. It includes an HTTP server to stage payloads, supporting both direct command execution and reverse shell capabilities.
Classification
Working Poc 100%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Network access to the target · Victim interaction to open the malicious document
nomisec
WORKING POC
3 stars
by rouben · poc
https://github.com/rouben/CVE-2022-30190-NSIS
This NSIS script automates the application and rollback of the registry-based mitigation for CVE-2022-30190 (Follina) by removing or restoring the `HKCR\ms-msdt` registry key. It is a mitigation tool rather than an exploit, designed to temporarily disable the vulnerable MSDT URL protocol handler.
Classification
Working Poc 90%
Target:
Microsoft Windows (MSDT URL Protocol Handler)
Auth required
Prerequisites:
Local administrative access to modify the registry
nomisec
WORKING POC
2 stars
by winstxnhdw · client-side
https://github.com/winstxnhdw/CVE-2022-30190
This repository contains a C#-based proof-of-concept exploit for CVE-2022-30190, which is a Microsoft Office remote code execution vulnerability. The exploit collects targeted file types from the victim's system, compresses them, and exfiltrates them to a remote server.
Classification
Working Poc 90%
Target:
Microsoft Office (Follina vulnerability)
No auth needed
Prerequisites:
Victim must open a malicious Office document · Attacker must have a server to receive exfiltrated data
nomisec
STUB
2 stars
by arozx · client-side
https://github.com/arozx/CVE-2022-30190
The repository provides a minimal Python HTTP server to serve an exploit.html file for CVE-2022-30190 (Microsoft Office RCE via MSDT). However, the actual exploit payload (exploit.html) is missing, making this a stub.
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Victim must open a malicious Office document or HTML file
nomisec
WORKING POC
2 stars
by amitniz · poc
https://github.com/amitniz/follina_cve_2022-30190
This repository contains a functional proof-of-concept exploit for CVE-2022-30190 (Follina), a Microsoft Office remote code execution vulnerability. The exploit generates a malicious Word document that triggers arbitrary PowerShell command execution via the MSDT URL protocol handler.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Network access to target · Target opens malicious Word document
nomisec
WRITEUP
2 stars
by gyaansastra · poc
https://github.com/gyaansastra/CVE-2022-30190
This repository provides a detailed analysis of CVE-2022-30190, a Microsoft Windows Support Diagnostic Tool (MSDT) remote code execution vulnerability. It includes a timeline, detection strategies, IOCs, and mitigation plans but does not contain actual exploit code.
Classification
Writeup 90%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT) in Windows 7+ and Server 2008+
No auth needed
Prerequisites:
Victim opens or previews a malicious Word document
nomisec
WORKING POC
2 stars
by Zitchev · client-side
https://github.com/Zitchev/go_follina
This Go-based PoC exploits CVE-2022-30190 (Follina) by generating a malicious Word document that triggers remote code execution via MSDT. It hosts a payload server to deliver a reverse shell executable.
Classification
Working Poc 95%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT) in Microsoft Office
No auth needed
Prerequisites:
Network access to the target · Victim interaction to open the malicious document
nomisec
WRITEUP
2 stars
by gamingwithevets · poc
https://github.com/gamingwithevets/msdt-disable
This repository provides a README describing a tool to disable the MSDT protocol as a mitigation for CVE-2022-30190 (Follina). It does not contain exploit code but explains a workaround for the vulnerability.
Classification
Writeup 100%
Target:
Microsoft Windows MSDT
No auth needed
Prerequisites:
Access to Windows registry
nomisec
WORKING POC
2 stars
by suenerve · poc
https://github.com/suenerve/CVE-2022-30190-Follina-Patch
This repository provides a Python script to patch CVE-2022-30190 (Follina) by deleting the vulnerable registry key 'HKEY_CLASSES_ROOT\ms-msdt'. It includes an option to back up the registry key before deletion.
Classification
Working Poc 100%
Target:
Microsoft Windows (ms-msdt registry key)
Auth required
Prerequisites:
Administrator privileges
nomisec
WORKING POC
2 stars
by jeffreybxu · poc
https://github.com/jeffreybxu/five-nights-at-follina-s
This repository contains a functional proof-of-concept exploit for CVE-2022-30190 (Follina), a remote code execution vulnerability in Microsoft Office. It includes tools to generate malicious documents and payloads, as well as defensive scripts to detect and mitigate the exploit using Sysmon logs.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
A web server to host payloads · Microsoft Office installed on the target · Sysmon for detection (defensive tools)
nomisec
WRITEUP
2 stars
by SonicWave21 · poc
https://github.com/SonicWave21/Follina-CVE-2022-30190-Unofficial-patch
This repository provides an unofficial patch for CVE-2022-30190 (Follina) by modifying registry settings as per Microsoft's guidelines. It includes a batch script to apply the patch and create a backup of the registry file.
Classification
Writeup 90%
Target:
Microsoft Windows (MSDT)
Auth required
Prerequisites:
Administrator privileges
nomisec
WORKING POC
1 stars
by hycheng15 · client-side
https://github.com/hycheng15/CVE-2022-30190
This repository contains a Python script that generates a malicious Word document exploiting CVE-2022-30190 (Follina). The exploit leverages the MS-MSDT protocol to execute arbitrary commands, including launching a reverse shell via netcat.
Classification
Working Poc 95%
Target:
Microsoft Office (Word) with MSDT
No auth needed
Prerequisites:
Python 3.8.10 · netifaces package · Microsoft Word installed · Network connectivity to attacker's HTTP server
nomisec
WORKING POC
1 stars
by derco0n · poc
https://github.com/derco0n/mitigate-folina
This repository contains PowerShell scripts to mitigate CVE-2022-30190 (Follina) by backing up and removing the vulnerable registry key (HKEY_CLASSES_ROOT\ms-msdt). It also includes a script for mitigating a related 'Search' vulnerability.
Classification
Working Poc 95%
Target:
Microsoft Windows (MSDT)
Auth required
Prerequisites:
Administrative or SYSTEM privileges
nomisec
WORKING POC
1 stars
by IamVSM · poc
https://github.com/IamVSM/msdt-follina
This PoC exploits CVE-2022-30190 (Follina) by generating a malicious Word document that triggers remote code execution via the MS-MSDT protocol. It includes an HTTP server to serve the payload and supports reverse shell functionality.
Classification
Working Poc 95%
Target:
Microsoft Windows Support Diagnostic Tool (MS-MSDT)
No auth needed
Prerequisites:
Network access to the target · Target opens the malicious Word document
nomisec
WRITEUP
1 stars
by rickhenderson · poc
https://github.com/rickhenderson/cve-2022-30190
This repository contains a README file referencing CVE-2022-30190 (Follina), a Microsoft Office RCE vulnerability. It notes that a specific commit does not work but does not provide functional exploit code.
Classification
Writeup 90%
Target:
Microsoft Office (multiple versions)
No auth needed
Prerequisites:
Victim opens a malicious Office document
nomisec
WORKING POC
1 stars
by alienkeric · poc
https://github.com/alienkeric/CVE-2022-30190
This PoC generates a malicious HTML payload exploiting CVE-2022-30190 (Follina) to achieve remote code execution via the MS-MSDT protocol. It encodes a PowerShell command in base64 to download and execute a reverse shell.
Classification
Working Poc 95%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Victim must open the malicious document or visit a crafted webpage
nomisec
WORKING POC
1 stars
by joshuavanderpoll · poc
https://github.com/joshuavanderpoll/CVE-2022-30190
This PoC generates a malicious Word document and HTML file exploiting CVE-2022-30190 (Follina) to achieve remote code execution via the Microsoft Support Diagnostic Tool (MSDT). The exploit leverages a crafted URL scheme to execute PowerShell commands or download/execute payloads.
Classification
Working Poc 95%
Target:
Microsoft Office (Word) with MSDT
No auth needed
Prerequisites:
Victim opens the malicious Word document · Outbound internet access to fetch the HTML payload
nomisec
WORKING POC
1 stars
by ITMarcin2211 · client-side
https://github.com/ITMarcin2211/CVE-2022-30190
This repository contains a proof-of-concept exploit for CVE-2022-30190 (Follina), a Microsoft Office remote code execution vulnerability. The exploit involves hosting an HTML file and tricking a user into opening a malicious DOCX file, which then executes arbitrary code (e.g., launching calc.exe).
Classification
Working Poc 90%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Hosting an HTML file on a web server · Modifying the DOCX file to point to the malicious URL
nomisec
WORKING POC
1 stars
by melting0256 · client-side
https://github.com/melting0256/Enterprise-Cybersecurity
This PoC exploits CVE-2022-30190 (Follina) by generating a malicious Word document that leverages the MS-MSDT URL protocol to execute arbitrary commands via a crafted HTML payload. It includes options for direct command execution or a reverse shell using netcat.
Classification
Working Poc 95%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT) via Microsoft Office
No auth needed
Prerequisites:
Network connectivity to the attacker's HTTP server · Victim opens the malicious Word document
nomisec
WORKING POC
1 stars
by ToxicEnvelope · local
https://github.com/ToxicEnvelope/FOLLINA-CVE-2022-30190
This repository contains a functional exploit for CVE-2022-30190 (Follina), which leverages MS-MSDT via malicious Word documents to achieve remote code execution. The exploit generates a weaponized document and hosts an HTTP server to deliver the payload, supporting commands like calc.exe, cmd.exe, or reverse shells.
Classification
Working Poc 95%
Target:
Microsoft Office (MS-MSDT)
No auth needed
Prerequisites:
Network access to the target · Target opens the malicious Word document · HTTP server reachable by the target
nomisec
WORKING POC
1 stars
by Muhammad-Ali007 · client-side
https://github.com/Muhammad-Ali007/Follina_MSDT_CVE-2022-30190
This repository contains a Python script and documentation for exploiting CVE-2022-30190, a remote code execution vulnerability in Microsoft Support Diagnostic Tool (MSDT) via malicious Word documents. The exploit leverages OLE objects and external HTML references to execute arbitrary commands without requiring macros.
Classification
Working Poc 95%
Target:
Microsoft Office (Word) and Microsoft Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Ability to deliver a malicious Word document to the target · Target system must have MSDT installed · Network access to host the malicious HTML payload
nomisec
WORKING POC
1 stars
by Jump-Wang-111 · client-side
https://github.com/Jump-Wang-111/AmzWord
This repository contains a working PoC for CVE-2022-30190 (Follina), which exploits a remote code execution vulnerability in Microsoft Office via malicious Word documents. It includes an automated attack chain with Gmail-based C2 (gdog) and image steganography for payload delivery.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Python 2.7/3.x · PyCrypto · WMI · Netifaces · Victim opens malicious Word document
nomisec
WRITEUP
1 stars
by kdk2933 · poc
https://github.com/kdk2933/msdt-CVE-2022-30190
This repository contains a README describing CVE-2022-30190, a zero-click RCE vulnerability in MSDT (Microsoft Support Diagnostic Tool). No exploit code is present.
Classification
Writeup 90%
Target:
Microsoft Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Microsoft Office installation with vulnerable MSDT
nomisec
WRITEUP
1 stars
by b401 · poc
https://github.com/b401/Clickstudio-compromised-certificate
This repository contains information about a compromised certificate used by Click Studios, including certificate details and an Advanced Hunting query for detection. It does not include exploit code but provides forensic details for identifying affected systems.
Classification
Writeup 90%
Target:
Click Studios software signed with the compromised certificate
No auth needed
Prerequisites:
Access to a system with software signed by the compromised certificate
nomisec
WORKING POC
1 stars
by michealadams30 · poc
https://github.com/michealadams30/Cve-2022-30190
This is a Python-based exploit for CVE-2022-30190 (Follina), which leverages a Microsoft Office remote code execution vulnerability via malicious document generation. The PoC includes options for command execution or reverse shell payloads.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Network access to target · Target opens malicious document
nomisec
STUB
by mitespsoc · poc
https://github.com/mitespsoc/CVE-2022-30190-POC
The repository contains only a README.md file with minimal content, lacking any functional exploit code or technical details for CVE-2022-30190. It appears to be a placeholder or incomplete submission.
Target:
unknown
No auth needed
nomisec
WRITEUP
by nimesh895 · poc
https://github.com/nimesh895/Malware-Analysis-Follina-CVE-2022-30190
This repository is a static malware analysis writeup documenting the investigation of a malicious Microsoft Word document exploiting CVE-2022-30190 (Follina). It includes steps for file observation, VirusTotal analysis, MITRE ATT&CK technique mapping, and URL analysis.
Classification
Writeup 100%
Target:
Microsoft Office Word 2007+
No auth needed
Prerequisites:
Malicious Word document with external relationship to trigger ms-msdt protocol handler
nomisec
WORKING POC
by 2867a0 · poc
https://github.com/2867a0/CVE-2022-30190
This PoC exploits CVE-2022-30190 (Follina) by generating a malicious .docx file that uses a frameset attack to execute arbitrary commands via the Microsoft Support Diagnostic Tool (MSDT). The script creates an evil.html file and a weaponized .docx file that references it.
Classification
Working Poc 90%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Attacker-controlled web server to host evil.html · Victim opens the malicious .docx file
nomisec
WRITEUP
by nanaao · poc
https://github.com/nanaao/PicusSecurity4.Week.Repo
This repository contains a README file describing CVE-2022-30190, also known as the 'Follina' vulnerability, which is a remote code execution (RCE) flaw in Microsoft Office. The README does not include exploit code or technical details beyond naming the vulnerability.
Classification
Writeup 90%
Target:
Microsoft Office (multiple versions)
No auth needed
Prerequisites:
Victim interaction (e.g., opening a malicious document)
nomisec
WORKING POC
by cyberdashy · poc
https://github.com/cyberdashy/CVE-2022-30190
This repository provides a PowerShell script to mitigate CVE-2022-30190 by disabling the Microsoft Support Diagnostic Tool (MSDT) via registry modification. The script sets the 'EnableDiagnostics' DWORD value to '0' to prevent exploitation of the vulnerability.
Classification
Working Poc 90%
Target:
Microsoft Windows (MSDT)
Auth required
Prerequisites:
Administrator privileges · Access to the target system
nomisec
WRITEUP
by yeep1115 · poc
https://github.com/yeep1115/ICT287_CVE-2022-30190_Exploit
This repository is a writeup for CVE-2022-30190 (Follina), detailing exploitation and mitigation strategies. It references external exploit code but does not contain direct exploit implementation.
Classification
Writeup 90%
Target:
Microsoft Office Pro Plus 2019 16.0.10325.20118
No auth needed
Prerequisites:
Malicious Word document · MSDT URL Protocol enabled · Victim interaction to open the document
nomisec
WRITEUP
by yrkuo · local
https://github.com/yrkuo/CVE-2022-30190
This repository provides a detailed writeup and step-by-step guide for exploiting CVE-2022-30190 (Follina), a remote code execution vulnerability in Microsoft Support Diagnostic Tool (MSDT). It includes instructions for crafting a malicious Word document and setting up a C2 server using a referenced Python script.
Classification
Writeup 90%
Target:
Microsoft Office (Word 2016) and Microsoft Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Microsoft Office (Word 2016) · Access to a server to host the malicious payload · Python script (Follina.py) for C2 server setup
nomisec
WORKING POC
by Nyx2022 · poc
https://github.com/Nyx2022/Follina-CVE-2022-30190-Sample
This repository contains a functional PoC for CVE-2022-30190 (Follina), a Microsoft Office RCE vulnerability. It includes tools to generate malicious RTF documents, extract payloads from infected files, and serve payloads via a simple HTTP server.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Victim opens a malicious RTF document · Network access to serve payload
nomisec
WRITEUP
by abhirules27 · poc
https://github.com/abhirules27/Follina
This repository provides a writeup and references for CVE-2022-30190 (Follina), a vulnerability in Microsoft Support Diagnostic Tool (MSDT) that allows remote code execution via malicious Word documents. It includes usage examples and links to PoC tools but does not contain exploit code itself.
Classification
Writeup 90%
Target:
Microsoft Windows MSDT (via Word documents)
No auth needed
Prerequisites:
Victim opens a malicious Word document · Network access to attacker-controlled server
nomisec
WORKING POC
by JotaQC · poc
https://github.com/JotaQC/CVE-2022-30190_Temporary_Fix
This repository provides two Python-compiled executables to temporarily mitigate CVE-2022-30190 (Follina) by modifying registry keys to disable the vulnerable MSDT troubleshooting feature. It includes a fix and a revert script.
Classification
Working Poc 90%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
Auth required
Prerequisites:
Administrator privileges · Access to the target system
nomisec
SCANNER
by ernestak · poc
https://github.com/ernestak/Sigma-Rule-for-CVE-2022-30190
This repository contains a Sigma rule for detecting suspicious msdt.exe execution patterns associated with CVE-2022-30190 (Follina). The rule monitors process creation logs for specific command-line arguments indicative of exploitation attempts.
Classification
Scanner 90%
Target:
Microsoft Windows MSDT (Microsoft Support Diagnostic Tool)
No auth needed
Prerequisites:
Access to Windows system logs · Sigma-compatible log monitoring tool
nomisec
WRITEUP
by seinab-ibrahim · poc
https://github.com/seinab-ibrahim/Follina-Vulnerability-CVE-2022-30190-Exploit-Analysis
This repository contains a detailed analysis and educational writeup of the Follina vulnerability (CVE-2022-30190) in Microsoft Office, including mitigation strategies. It does not include functional exploit code but provides research context.
Classification
Writeup 90%
Target:
Microsoft Office (multiple versions)
No auth needed
Prerequisites:
Victim interaction to open a malicious document
nomisec
WORKING POC
by notherealhazard · poc
https://github.com/notherealhazard/follina-CVE-2022-30190
This PoC exploits CVE-2022-30190 (Follina) by generating malicious Word/RTF documents that trigger remote code execution via the MSDT URL protocol handler. It supports both direct command execution and reverse shell payloads.
Classification
Working Poc 95%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Network access to target · Target opens malicious document
nomisec
WORKING POC
by Cerebrovinny · poc
https://github.com/Cerebrovinny/follina-CVE-2022-30190
This is a functional PoC for CVE-2022-30190 (Follina), a Microsoft Office RCE vulnerability. It generates a malicious Word document that exploits the MS-MSDT protocol to execute arbitrary commands, optionally including a reverse shell.
Classification
Working Poc 95%
Target:
Microsoft Office (Word)
No auth needed
Prerequisites:
Network access to target · Target opens malicious Word document
nomisec
WORKING POC
by Imeneallouche · client-side
https://github.com/Imeneallouche/Follina-attack-CVE-2022-30190-
This repository contains a functional proof-of-concept exploit for CVE-2022-30190 (Follina), a Microsoft Office remote code execution vulnerability. The exploit generates a malicious Word document that leverages the MSDT URL protocol to execute arbitrary commands via PowerShell.
Classification
Working Poc 90%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Network access to the target · Target opens the malicious document
nomisec
WORKING POC
by sentrium-security · poc
https://github.com/sentrium-security/Follina-Workaround-CVE-2022-30190
This repository contains PowerShell scripts to mitigate CVE-2022-30190 (Follina) by removing the 'HKEY_CLASSES_ROOT\ms-msdt' registry key and restoring it if needed. The scripts are designed for local or InTune deployment.
Classification
Working Poc 100%
Target:
Microsoft Windows (MSDT)
Auth required
Prerequisites:
Elevated PowerShell privileges · Access to the target system
nomisec
WORKING POC
by hilt86 · poc
https://github.com/hilt86/cve-2022-30190-mitigate
This PowerShell script mitigates CVE-2022-30190 (Follina) by removing the vulnerable 'ms-msdt' registry key. It backs up the key before deletion to allow for potential restoration.
Classification
Working Poc 90%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
Auth required
Prerequisites:
Administrative privileges to modify registry keys
nomisec
WORKING POC
by ethicalblue · local
https://github.com/ethicalblue/Follina-CVE-2022-30190-Sample
This repository contains a functional PoC for CVE-2022-30190 (Follina), a Microsoft Office RCE vulnerability. It includes tools to generate malicious RTF documents and extract payloads from infected files.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Victim opens a malicious RTF document
nomisec
WRITEUP
by RathoreAbhiii · poc
https://github.com/RathoreAbhiii/Folina-Vulnerability-Exploitation-Detection-and-Mitigation
This repository appears to be a writeup or documentation project for CVE-2022-30190 (Follina), focusing on exploitation, detection, and mitigation. No actual exploit code is present in the provided README.
Classification
Writeup 90%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Victim interaction (e.g., opening a malicious document)
nomisec
STUB
by mattjmillner · poc
https://github.com/mattjmillner/CVE-Smackdown
The repository contains only a README.md with a vague, non-technical statement and no exploit code or details. No actionable PoC or technical information is provided.
Target:
unknown
No auth needed
nomisec
WRITEUP
by ernestak · poc
https://github.com/ernestak/CVE-2022-30190
This repository contains a detailed writeup and guidance for CVE-2022-30190, a Microsoft Support Diagnostic Tool (MSDT) vulnerability. It includes mitigation steps, detection methods, and FAQs but does not contain exploit code.
Classification
Writeup 100%
Target:
Microsoft Support Diagnostic Tool (MSDT) in Windows
No auth needed
Prerequisites:
Victim interaction required (e.g., opening a malicious document) · MSDT URL protocol enabled
nomisec
WRITEUP
by Abdibimantara · poc
https://github.com/Abdibimantara/CVE-2022-30190-Analysis-With-LetsDefends-Lab
This repository contains a writeup analyzing CVE-2022-30190, a zero-day vulnerability in Microsoft Office. It provides background information and context about the vulnerability but does not include exploit code or technical details for reproduction.
Classification
Writeup 100%
Target:
Microsoft Office
No auth needed
github
WRITEUP
by OscarYR · poc
https://github.com/OscarYR/CVE_Reproduction/tree/main/Follina/CVE-2022-30190.md
This repository provides a detailed technical analysis of CVE-2022-30190 (Follina), including the vulnerability's root cause, exploitation steps, and mitigation strategies. It includes a step-by-step breakdown of how the ms-msdt protocol is abused for remote code execution in Microsoft Office.
Classification
Writeup 100%
Target:
Microsoft Office (Word, Excel, other apps using MSHTML and MSDT) – versions prior to June 2022 patch
No auth needed
Prerequisites:
Crafted .docx file with external HTML reference · Victim interaction to open the document
nomisec
WRITEUP
by aymankhder · poc
https://github.com/aymankhder/MSDT_CVE-2022-30190-follina-
This repository appears to be a placeholder or incomplete writeup for CVE-2022-30190 (Follina), a Microsoft Windows Support Diagnostic Tool (MSDT) vulnerability. The README.md file contains no substantive content or exploit code.
Classification
Writeup 90%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT)
No auth needed
Prerequisites:
Victim interaction to open a malicious document
nomisec
WORKING POC
by hscorpion · poc
https://github.com/hscorpion/CVE-2022-30190
This PoC exploits CVE-2022-30190 (Microsoft Office RCE via malicious Word document) by generating a weaponized .docx file that references a remote HTML payload. The script automates the creation of the exploit document and hosts the payload via a simple HTTP server.
Classification
Working Poc 90%
Target:
Microsoft Office (Word)
No auth needed
Prerequisites:
Windows environment · Python 3 · PowerShell (for Compress-Archive) · Network access to host the payload
nomisec
WRITEUP
by castlesmadeofsand · poc
https://github.com/castlesmadeofsand/ms-msdt-vulnerability-pdq-package
This repository provides a PDQ package for detecting the presence of the MS-MSDT vulnerability (CVE-2022-30190) by checking for specific registry keys. It includes instructions for deployment but does not contain exploit code.
Classification
Writeup 90%
Target:
Microsoft Windows MSDT
Auth required
Prerequisites:
PDQ Inventory for full functionality · Access to target system registry
nomisec
WORKING POC
by JotaQC · poc
https://github.com/JotaQC/CVE-2022-30190_Temporary_Fix_Source_Code
This repository contains two Python scripts designed to temporarily mitigate CVE-2022-30190 (Follina) by modifying Windows registry keys to disable the MSDT troubleshooter and restore it later. The scripts automate the backup, deletion, and restoration of registry keys.
Classification
Working Poc 90%
Target:
Microsoft Windows (MSDT)
Auth required
Prerequisites:
Administrator privileges
nomisec
WORKING POC
by WesyHub · poc
https://github.com/WesyHub/CVE-2022-30190---Follina---Poc-Exploit
This is a functional PoC exploit for CVE-2022-30190 (Follina), which leverages a malicious Office document to execute arbitrary commands via the MSDT URL protocol handler. The script generates a weaponized document and hosts a payload server to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Microsoft Office (tested on Office 2019)
No auth needed
Prerequisites:
Network access to the target · Target must open the malicious document
nomisec
SCANNER
by XxToxicScriptxX · poc
https://github.com/XxToxicScriptxX/CVE-2022-30190
This is a scanner tool designed to detect malicious content in office documents by analyzing file contents for suspicious patterns and keywords. It does not exploit CVE-2022-30190 but instead scans for indicators of compromise.
Classification
Scanner 90%
Target:
Office documents (e.g., Word, Excel)
No auth needed
Prerequisites:
Access to potentially malicious office documents
nomisec
SCANNER
by shri142 · poc
https://github.com/shri142/ZipScan
This is a Go-based scanner tool designed to detect the presence of the Follina exploit (CVE-2022-30190) in ZIP files by analyzing embedded URLs and checking for the 'ms-msdt' string in HTTP responses. It supports recursive directory scanning and verbose output.
Classification
Scanner 100%
Target:
Microsoft Office documents (via ZIP scanning)
No auth needed
Prerequisites:
Access to files or directories to scan
nomisec
WRITEUP
by Arkha-Corvus · poc
https://github.com/Arkha-Corvus/LetsDefend-SOC173-Follina-0-Day-Detected
This repository is a detailed writeup and analysis of the Follina (CVE-2022-30190) vulnerability, including investigation steps, log analysis, and threat intelligence findings. It does not contain exploit code but provides a comprehensive breakdown of the attack vector and mitigation steps.
Classification
Writeup 100%
Target:
Microsoft Windows MSDT (Microsoft Support Diagnostic Tool)
No auth needed
Prerequisites:
Victim opens a malicious Word document · MSDT tool accessible on the target system
patchapalooza
WORKING POC
by 0xAbbarhSF · client-side
https://github.com/0xAbbarhSF/FollinaXploit
This repository contains a functional Python-based exploit for CVE-2022-30190 (Follina), which leverages the MSDT vulnerability to execute arbitrary commands or establish a reverse shell via malicious Office documents. The tool generates weaponized .doc, .docx, or .rtf files with embedded MSProtocol URI schemes to trigger remote code execution.
Classification
Working Poc 95%
Target:
Microsoft Office (MSDT)
No auth needed
Prerequisites:
Python 3.x · pyfiglet · network connectivity to attacker-controlled server
metasploit
WORKING POC
EXCELLENT
by nao sec, mekhalleh (RAMELLA Sébastien), bwatters-r7 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/word_msdtjs_rce.rb
This Metasploit module generates a malicious Microsoft Word document that exploits CVE-2022-30190 (Follina) by leveraging the remote template feature to fetch an HTML document and execute PowerShell code via the ms-msdt scheme.
Classification
Working Poc 100%
Target:
Microsoft Office Word
No auth needed
Prerequisites:
Network access to the target · Target must open the malicious document
patchapalooza
WORKING POC
by alien-keric · client-side
https://github.com/alien-keric/CVE-2022-30190
This repository contains a functional Python script that generates a malicious HTML payload exploiting CVE-2022-30190 (Follina). The payload leverages the MS-MSDT URI scheme to execute arbitrary commands via PowerShell, bypassing security mechanisms in Microsoft Office.
Classification
Working Poc 95%
Target:
Microsoft Windows Support Diagnostic Tool (MSDT) in Microsoft Office
No auth needed
Prerequisites:
Victim must open a malicious document or visit a malicious webpage