Share
## https://sploitus.com/exploit?id=675E960A-9F2E-5575-8C21-8528492BE5C6
# FollinaExtractor
Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files

usage: extract_follina.py -f C:\path\to\file.rtf