FollinaExtractor Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files usage: extract_follina.py -f C:\path\to\file.rtf