[ { "id": 498052694, "name": "PoC-CVE-2022-30190", "full_name": "JMousqueton\/PoC-CVE-2022-30190", "owner": { "login": "JMousqueton", "id": 4148567, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4148567?v=4", "html_url": "https:\/\/github.com\/JMousqueton" }, "html_url": "https:\/\/github.com\/JMousqueton\/PoC-CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-05-30T18:17:38Z", "updated_at": "2022-06-26T16:09:47Z", "pushed_at": "2022-06-05T21:06:13Z", "stargazers_count": 130, "watchers_count": 130, "forks_count": 48, "allow_forking": true, "is_template": false, "topics": [ "cve", "follina", "msoffice", "poc", "proof-of-concept", "rce", "vulnerability" ], "visibility": "public", "forks": 48, "watchers": 130, "score": 0 }, { "id": 498218229, "name": "CVE-2022-30190", "full_name": "onecloudemoji\/CVE-2022-30190", "owner": { "login": "onecloudemoji", "id": 46857300, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46857300?v=4", "html_url": "https:\/\/github.com\/onecloudemoji" }, "html_url": "https:\/\/github.com\/onecloudemoji\/CVE-2022-30190", "description": "CVE-2022-30190 Follina POC", "fork": false, "created_at": "2022-05-31T06:45:25Z", "updated_at": "2022-06-24T05:43:07Z", "pushed_at": "2022-05-31T09:35:37Z", "stargazers_count": 90, "watchers_count": 90, "forks_count": 27, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 27, "watchers": 90, "score": 0 }, { "id": 498253545, "name": "CVE-2022-30190", "full_name": "2867a0\/CVE-2022-30190", "owner": { "login": "2867a0", "id": 42805417, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42805417?v=4", "html_url": "https:\/\/github.com\/2867a0" }, "html_url": "https:\/\/github.com\/2867a0\/CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-05-31T08:39:09Z", "updated_at": "2022-06-01T23:05:08Z", "pushed_at": "2022-05-31T08:43:28Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 498322212, "name": "CVE-2022-30190", "full_name": "bytecaps\/CVE-2022-30190", "owner": { "login": "bytecaps", "id": 52679771, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4", "html_url": "https:\/\/github.com\/bytecaps" }, "html_url": "https:\/\/github.com\/bytecaps\/CVE-2022-30190", "description": "Microsoft Office Word Rce 复现(CVE-2022-30190)", "fork": false, "created_at": "2022-05-31T12:15:18Z", "updated_at": "2022-06-22T06:52:01Z", "pushed_at": "2022-05-31T12:27:50Z", "stargazers_count": 35, "watchers_count": 35, "forks_count": 13, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 35, "score": 0 }, { "id": 498363809, "name": "MSDT_CVE-2022-30190", "full_name": "archanchoudhury\/MSDT_CVE-2022-30190", "owner": { "login": "archanchoudhury", "id": 51078911, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51078911?v=4", "html_url": "https:\/\/github.com\/archanchoudhury" }, "html_url": "https:\/\/github.com\/archanchoudhury\/MSDT_CVE-2022-30190", "description": "This Repository Talks about the Follina MSDT from Defender Perspective", "fork": false, "created_at": "2022-05-31T14:10:11Z", "updated_at": "2022-06-11T20:47:52Z", "pushed_at": "2022-06-02T09:12:54Z", "stargazers_count": 32, "watchers_count": 32, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 32, "score": 0 }, { "id": 498379315, "name": "cve-2022-30190", "full_name": "rickhenderson\/cve-2022-30190", "owner": { "login": "rickhenderson", "id": 4127791, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4127791?v=4", "html_url": "https:\/\/github.com\/rickhenderson" }, "html_url": "https:\/\/github.com\/rickhenderson\/cve-2022-30190", "description": "Aka Follina = benign POC.", "fork": false, "created_at": "2022-05-31T14:50:55Z", "updated_at": "2022-05-31T15:01:16Z", "pushed_at": "2022-05-31T15:59:25Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 498408278, "name": "CVE-2022-30190-ASR-Senintel-Process-Pickup", "full_name": "DOV3Y\/CVE-2022-30190-ASR-Senintel-Process-Pickup", "owner": { "login": "DOV3Y", "id": 89396131, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89396131?v=4", "html_url": "https:\/\/github.com\/DOV3Y" }, "html_url": "https:\/\/github.com\/DOV3Y\/CVE-2022-30190-ASR-Senintel-Process-Pickup", "description": "Picking up processes that have triggered ASR related to CVE-2022-30190", "fork": false, "created_at": "2022-05-31T16:11:14Z", "updated_at": "2022-05-31T16:11:14Z", "pushed_at": "2022-05-31T16:15:51Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 498441804, "name": "msdt-CVE-2022-30190", "full_name": "kdk2933\/msdt-CVE-2022-30190", "owner": { "login": "kdk2933", "id": 31010136, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31010136?v=4", "html_url": "https:\/\/github.com\/kdk2933" }, "html_url": "https:\/\/github.com\/kdk2933\/msdt-CVE-2022-30190", "description": "CVE-2022-30190- A Zero-Click RCE Vulnerability In MSDT", "fork": false, "created_at": "2022-05-31T17:54:20Z", "updated_at": "2022-06-02T21:05:10Z", "pushed_at": "2022-05-31T17:54:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 498443788, "name": "CVE-2022-30190", "full_name": "sentinelblue\/CVE-2022-30190", "owner": { "login": "sentinelblue", "id": 70291995, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70291995?v=4", "html_url": "https:\/\/github.com\/sentinelblue" }, "html_url": "https:\/\/github.com\/sentinelblue\/CVE-2022-30190", "description": "Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE-2022-30190.", "fork": false, "created_at": "2022-05-31T18:00:42Z", "updated_at": "2022-06-02T14:34:24Z", "pushed_at": "2022-06-08T15:18:45Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "alerting", "asim", "cve-2022-30190", "hunting", "sentinel" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 498457928, "name": "MSDT_CVE-2022-30190-follina-", "full_name": "aymankhder\/MSDT_CVE-2022-30190-follina-", "owner": { "login": "aymankhder", "id": 12251266, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12251266?v=4", "html_url": "https:\/\/github.com\/aymankhder" }, "html_url": "https:\/\/github.com\/aymankhder\/MSDT_CVE-2022-30190-follina-", "description": null, "fork": false, "created_at": "2022-05-31T18:45:34Z", "updated_at": "2022-05-31T18:45:34Z", "pushed_at": "2022-05-31T18:51:30Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 498462165, "name": "CVE-2022-30190", "full_name": "trhacknon\/CVE-2022-30190", "owner": { "login": "trhacknon", "id": 98242014, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", "html_url": "https:\/\/github.com\/trhacknon" }, "html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-05-31T18:58:55Z", "updated_at": "2022-06-13T06:06:19Z", "pushed_at": "2022-06-03T00:23:24Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0 }, { "id": 498528729, "name": "cve-2022-30190", "full_name": "PaddlingCode\/cve-2022-30190", "owner": { "login": "PaddlingCode", "id": 55930531, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55930531?v=4", "html_url": "https:\/\/github.com\/PaddlingCode" }, "html_url": "https:\/\/github.com\/PaddlingCode\/cve-2022-30190", "description": "CVE-2022-30190 remediation via removal of ms-msdt from Windows registry", "fork": false, "created_at": "2022-05-31T23:32:33Z", "updated_at": "2022-06-07T07:53:31Z", "pushed_at": "2022-05-31T23:43:02Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 5, "score": 0 }, { "id": 498587421, "name": "CVE-2022-30190", "full_name": "ExploitPwner\/CVE-2022-30190", "owner": { "login": "ExploitPwner", "id": 103929208, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4", "html_url": "https:\/\/github.com\/ExploitPwner" }, "html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2022-30190", "description": "MSDT 0-Day Mass Exploitation Tool", "fork": false, "created_at": "2022-06-01T04:15:25Z", "updated_at": "2022-06-22T13:17:14Z", "pushed_at": "2022-06-01T04:25:17Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "0day", "cve-2022-30190", "exploit", "msdt", "zero-click", "zero-day" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 498663128, "name": "gollina", "full_name": "dwisiswant0\/gollina", "owner": { "login": "dwisiswant0", "id": 25837540, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4", "html_url": "https:\/\/github.com\/dwisiswant0" }, "html_url": "https:\/\/github.com\/dwisiswant0\/gollina", "description": "Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go", "fork": false, "created_at": "2022-06-01T09:02:00Z", "updated_at": "2022-06-22T06:55:17Z", "pushed_at": "2022-06-01T09:31:58Z", "stargazers_count": 15, "watchers_count": 15, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-30190", "follina", "go", "golang", "ms-msdt" ], "visibility": "public", "forks": 4, "watchers": 15, "score": 0 }, { "id": 498686009, "name": "CVE-2022-30190", "full_name": "hscorpion\/CVE-2022-30190", "owner": { "login": "hscorpion", "id": 22425159, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22425159?v=4", "html_url": "https:\/\/github.com\/hscorpion" }, "html_url": "https:\/\/github.com\/hscorpion\/CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-06-01T10:13:16Z", "updated_at": "2022-06-06T16:59:02Z", "pushed_at": "2022-06-06T17:08:13Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 498710957, "name": "CVE-2022-30190-follina", "full_name": "drgreenthumb93\/CVE-2022-30190-follina", "owner": { "login": "drgreenthumb93", "id": 50826299, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50826299?v=4", "html_url": "https:\/\/github.com\/drgreenthumb93" }, "html_url": "https:\/\/github.com\/drgreenthumb93\/CVE-2022-30190-follina", "description": "Just another PoC for the new MSDT-Exploit", "fork": false, "created_at": "2022-06-01T11:37:08Z", "updated_at": "2022-06-15T17:43:58Z", "pushed_at": "2022-06-07T08:35:35Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 6, "score": 0 }, { "id": 498780691, "name": "CVE-2022-30190-POC", "full_name": "mitespsoc\/CVE-2022-30190-POC", "owner": { "login": "mitespsoc", "id": 105447645, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105447645?v=4", "html_url": "https:\/\/github.com\/mitespsoc" }, "html_url": "https:\/\/github.com\/mitespsoc\/CVE-2022-30190-POC", "description": null, "fork": false, "created_at": "2022-06-01T14:55:43Z", "updated_at": "2022-06-01T15:00:56Z", "pushed_at": "2022-06-01T15:41:26Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 498808251, "name": "MSDT-0-Day-CVE-2022-30190-Poc", "full_name": "Vaisakhkm2625\/MSDT-0-Day-CVE-2022-30190-Poc", "owner": { "login": "Vaisakhkm2625", "id": 68694876, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68694876?v=4", "html_url": "https:\/\/github.com\/Vaisakhkm2625" }, "html_url": "https:\/\/github.com\/Vaisakhkm2625\/MSDT-0-Day-CVE-2022-30190-Poc", "description": null, "fork": false, "created_at": "2022-06-01T16:11:33Z", "updated_at": "2022-06-01T16:13:04Z", "pushed_at": "2022-06-01T16:48:37Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 498863365, "name": "CVE-2022-30190-NSIS", "full_name": "rouben\/CVE-2022-30190-NSIS", "owner": { "login": "rouben", "id": 2985666, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2985666?v=4", "html_url": "https:\/\/github.com\/rouben" }, "html_url": "https:\/\/github.com\/rouben\/CVE-2022-30190-NSIS", "description": "An NSIS script that helps deploy and roll back the mitigation registry patch for CVE-2022-30190 as recommended by Microsoft", "fork": false, "created_at": "2022-06-01T18:58:07Z", "updated_at": "2022-06-07T08:02:05Z", "pushed_at": "2022-06-01T22:23:34Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-30190", "microsoft", "msdt", "nsis" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 498888452, "name": "Follina-Remediation", "full_name": "Cosmo121\/Follina-Remediation", "owner": { "login": "Cosmo121", "id": 3526206, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3526206?v=4", "html_url": "https:\/\/github.com\/Cosmo121" }, "html_url": "https:\/\/github.com\/Cosmo121\/Follina-Remediation", "description": "Removes the ability for MSDT to run, in response to CVE-2022-30190 (Follina)", "fork": false, "created_at": "2022-06-01T20:26:56Z", "updated_at": "2022-06-09T13:11:08Z", "pushed_at": "2022-06-01T20:29:14Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0 }, { "id": 498904586, "name": "CVE-2022-30190", "full_name": "rayorole\/CVE-2022-30190", "owner": { "login": "rayorole", "id": 87602506, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87602506?v=4", "html_url": "https:\/\/github.com\/rayorole" }, "html_url": "https:\/\/github.com\/rayorole\/CVE-2022-30190", "description": "CVE-2022-30190 or \"Follina\" 0day proof of concept", "fork": false, "created_at": "2022-06-01T21:33:18Z", "updated_at": "2022-06-01T21:36:47Z", "pushed_at": "2022-06-01T21:36:44Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 498924006, "name": "2022_PoC-MSDT-Follina-CVE-2022-30190", "full_name": "ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190", "owner": { "login": "ImproveCybersecurityJaro", "id": 106711305, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106711305?v=4", "html_url": "https:\/\/github.com\/ImproveCybersecurityJaro" }, "html_url": "https:\/\/github.com\/ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190", "description": "Proof of Concept zu MSDT-Follina - CVE-2022-30190. ÜBERPRÜFUNG DER WIRKSAMKEIT VON MICROSOFT DEFNEDER IN DER JEWEILS AKTUELLSTEN WINDOWS 10 VERSION.", "fork": false, "created_at": "2022-06-01T23:07:26Z", "updated_at": "2022-06-01T23:07:26Z", "pushed_at": "2022-06-01T23:30:01Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 498927734, "name": "CVE-2022-30190", "full_name": "sudoaza\/CVE-2022-30190", "owner": { "login": "sudoaza", "id": 555365, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/555365?v=4", "html_url": "https:\/\/github.com\/sudoaza" }, "html_url": "https:\/\/github.com\/sudoaza\/CVE-2022-30190", "description": "MS-MSDT Follina CVE-2022-30190 PoC document generator", "fork": false, "created_at": "2022-06-01T23:27:14Z", "updated_at": "2022-06-21T17:37:57Z", "pushed_at": "2022-06-01T23:30:26Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0 }, { "id": 498968929, "name": "msdt-disable", "full_name": "gamingwithevets\/msdt-disable", "owner": { "login": "gamingwithevets", "id": 88830673, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88830673?v=4", "html_url": "https:\/\/github.com\/gamingwithevets" }, "html_url": "https:\/\/github.com\/gamingwithevets\/msdt-disable", "description": "MSDT protocol disabler (CVE-2022-30190 patch tool)", "fork": false, "created_at": "2022-06-02T02:47:34Z", "updated_at": "2022-06-26T10:10:48Z", "pushed_at": "2022-06-26T10:10:37Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 499022838, "name": "FollinaScanner", "full_name": "ErrorNoInternet\/FollinaScanner", "owner": { "login": "ErrorNoInternet", "id": 61157623, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61157623?v=4", "html_url": "https:\/\/github.com\/ErrorNoInternet" }, "html_url": "https:\/\/github.com\/ErrorNoInternet\/FollinaScanner", "description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)", "fork": false, "created_at": "2022-06-02T06:45:19Z", "updated_at": "2022-06-23T20:46:15Z", "pushed_at": "2022-06-18T12:05:58Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ "antivirus", "cve-2022-30190", "follina", "golang", "scanner" ], "visibility": "public", "forks": 3, "watchers": 9, "score": 0 }, { "id": 499027429, "name": "CVE-2022-30190", "full_name": "ITMarcin2211\/CVE-2022-30190", "owner": { "login": "ITMarcin2211", "id": 60057530, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4", "html_url": "https:\/\/github.com\/ITMarcin2211" }, "html_url": "https:\/\/github.com\/ITMarcin2211\/CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-06-02T07:01:19Z", "updated_at": "2022-06-02T07:03:36Z", "pushed_at": "2022-06-02T07:04:59Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 499073115, "name": "mitigate-folina", "full_name": "derco0n\/mitigate-folina", "owner": { "login": "derco0n", "id": 13888192, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13888192?v=4", "html_url": "https:\/\/github.com\/derco0n" }, "html_url": "https:\/\/github.com\/derco0n\/mitigate-folina", "description": "Mitigates the \"Folina\"-ZeroDay (CVE-2022-30190)", "fork": false, "created_at": "2022-06-02T09:30:13Z", "updated_at": "2022-06-09T12:18:29Z", "pushed_at": "2022-06-08T05:57:31Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 499127993, "name": "CVE-2022-30190-follina-Office-MSDT-Fixed", "full_name": "komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed", "owner": { "login": "komomon", "id": 52700174, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4", "html_url": "https:\/\/github.com\/komomon" }, "html_url": "https:\/\/github.com\/komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed", "description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。", "fork": false, "created_at": "2022-06-02T12:33:18Z", "updated_at": "2022-06-26T15:15:40Z", "pushed_at": "2022-06-06T07:19:53Z", "stargazers_count": 294, "watchers_count": 294, "forks_count": 40, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 40, "watchers": 294, "score": 0 }, { "id": 499136019, "name": "CVE-2022-30190", "full_name": "gyaansastra\/CVE-2022-30190", "owner": { "login": "gyaansastra", "id": 35690123, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4", "html_url": "https:\/\/github.com\/gyaansastra" }, "html_url": "https:\/\/github.com\/gyaansastra\/CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-06-02T12:58:24Z", "updated_at": "2022-06-04T14:08:59Z", "pushed_at": "2022-06-02T13:00:33Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 499137152, "name": "CVE-2022-30190-Fix", "full_name": "swaiist\/CVE-2022-30190-Fix", "owner": { "login": "swaiist", "id": 67833362, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833362?v=4", "html_url": "https:\/\/github.com\/swaiist" }, "html_url": "https:\/\/github.com\/swaiist\/CVE-2022-30190-Fix", "description": null, "fork": false, "created_at": "2022-06-02T13:01:46Z", "updated_at": "2022-06-07T07:22:14Z", "pushed_at": "2022-06-02T13:11:16Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 499151925, "name": "CVE-2022-30190-Follina-Patch", "full_name": "suegdu\/CVE-2022-30190-Follina-Patch", "owner": { "login": "suegdu", "id": 91017265, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91017265?v=4", "html_url": "https:\/\/github.com\/suegdu" }, "html_url": "https:\/\/github.com\/suegdu\/CVE-2022-30190-Follina-Patch", "description": "The CVE-2022-30190-follina Workarounds Patch", "fork": false, "created_at": "2022-06-02T13:43:20Z", "updated_at": "2022-06-06T12:03:46Z", "pushed_at": "2022-06-05T12:37:12Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "administrator", "cmd", "cve", "cve-2022-30190", "exe", "microsoft", "patch", "program", "py", "python", "windows" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 499192008, "name": "ms-msdt-vulnerability-pdq-package", "full_name": "castlesmadeofsand\/ms-msdt-vulnerability-pdq-package", "owner": { "login": "castlesmadeofsand", "id": 50452151, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50452151?v=4", "html_url": "https:\/\/github.com\/castlesmadeofsand" }, "html_url": "https:\/\/github.com\/castlesmadeofsand\/ms-msdt-vulnerability-pdq-package", "description": "PDQ Package I created for CVE-2022-30190", "fork": false, "created_at": "2022-06-02T15:33:15Z", "updated_at": "2022-06-02T15:44:35Z", "pushed_at": "2022-06-08T21:04:55Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 499194094, "name": "CVE-2022-30190---Follina---Poc-Exploit", "full_name": "WesyHub\/CVE-2022-30190---Follina---Poc-Exploit", "owner": { "login": "WesyHub", "id": 35263085, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35263085?v=4", "html_url": "https:\/\/github.com\/WesyHub" }, "html_url": "https:\/\/github.com\/WesyHub\/CVE-2022-30190---Follina---Poc-Exploit", "description": "Simple Follina poc exploit", "fork": false, "created_at": "2022-06-02T15:39:20Z", "updated_at": "2022-06-02T16:56:58Z", "pushed_at": "2022-06-03T06:49:34Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 499203683, "name": "MS-MSDT-Office-RCE-Follina", "full_name": "AchocolatechipPancake\/MS-MSDT-Office-RCE-Follina", "owner": { "login": "AchocolatechipPancake", "id": 59506742, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59506742?v=4", "html_url": "https:\/\/github.com\/AchocolatechipPancake" }, "html_url": "https:\/\/github.com\/AchocolatechipPancake\/MS-MSDT-Office-RCE-Follina", "description": "CVE-2022-30190 | MS-MSDT Follina One Click", "fork": false, "created_at": "2022-06-02T16:09:02Z", "updated_at": "2022-06-22T07:09:23Z", "pushed_at": "2022-06-03T08:14:10Z", "stargazers_count": 15, "watchers_count": 15, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 15, "score": 0 }, { "id": 499331391, "name": "follina", "full_name": "Noxtal\/follina", "owner": { "login": "Noxtal", "id": 44851191, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44851191?v=4", "html_url": "https:\/\/github.com\/Noxtal" }, "html_url": "https:\/\/github.com\/Noxtal\/follina", "description": "All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.", "fork": false, "created_at": "2022-06-03T00:25:37Z", "updated_at": "2022-06-03T00:25:41Z", "pushed_at": "2022-06-05T15:15:33Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 499395518, "name": "CVE-2022-30190", "full_name": "droidrzrlover\/CVE-2022-30190", "owner": { "login": "droidrzrlover", "id": 19541946, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19541946?v=4", "html_url": "https:\/\/github.com\/droidrzrlover" }, "html_url": "https:\/\/github.com\/droidrzrlover\/CVE-2022-30190", "description": "This is to patch CVE-2022-30190. Use at your own risk. ", "fork": false, "created_at": "2022-06-03T05:52:36Z", "updated_at": "2022-06-03T05:53:04Z", "pushed_at": "2022-06-03T05:53:02Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 499410553, "name": "cve-2022-30190-mitigate", "full_name": "hilt86\/cve-2022-30190-mitigate", "owner": { "login": "hilt86", "id": 441824, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/441824?v=4", "html_url": "https:\/\/github.com\/hilt86" }, "html_url": "https:\/\/github.com\/hilt86\/cve-2022-30190-mitigate", "description": "Powershell script to mitigate cve-2022-30190", "fork": false, "created_at": "2022-06-03T06:54:35Z", "updated_at": "2022-06-03T06:55:13Z", "pushed_at": "2022-06-03T06:55:10Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 499428287, "name": "CVE-2022-30190", "full_name": "SrikeshMaharaj\/CVE-2022-30190", "owner": { "login": "SrikeshMaharaj", "id": 24547010, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24547010?v=4", "html_url": "https:\/\/github.com\/SrikeshMaharaj" }, "html_url": "https:\/\/github.com\/SrikeshMaharaj\/CVE-2022-30190", "description": "Follina POC by John Hammond", "fork": false, "created_at": "2022-06-03T08:00:01Z", "updated_at": "2022-06-04T12:35:14Z", "pushed_at": "2022-06-03T08:04:36Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 499922590, "name": "CVE-2022-30190", "full_name": "DerZiad\/CVE-2022-30190", "owner": { "login": "DerZiad", "id": 40337316, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40337316?v=4", "html_url": "https:\/\/github.com\/DerZiad" }, "html_url": "https:\/\/github.com\/DerZiad\/CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-06-04T19:48:37Z", "updated_at": "2022-06-10T19:05:48Z", "pushed_at": "2022-06-10T09:55:28Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 5, "score": 0 }, { "id": 500045782, "name": "CVE-2022-30190-Zero-Click-Zero-Day-in-msdt", "full_name": "tej7gandhi\/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt", "owner": { "login": "tej7gandhi", "id": 13482291, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13482291?v=4", "html_url": "https:\/\/github.com\/tej7gandhi" }, "html_url": "https:\/\/github.com\/tej7gandhi\/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt", "description": null, "fork": false, "created_at": "2022-06-05T08:52:11Z", "updated_at": "2022-06-05T08:54:30Z", "pushed_at": "2022-06-05T08:54:27Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 500111558, "name": "Folina-CVE-2022-30190-POC", "full_name": "ItsNee\/Folina-CVE-2022-30190-POC", "owner": { "login": "ItsNee", "id": 28183719, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28183719?v=4", "html_url": "https:\/\/github.com\/ItsNee" }, "html_url": "https:\/\/github.com\/ItsNee\/Folina-CVE-2022-30190-POC", "description": null, "fork": false, "created_at": "2022-06-05T13:54:04Z", "updated_at": "2022-06-25T12:06:36Z", "pushed_at": "2022-06-05T14:33:00Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 500366448, "name": "msdt-follina", "full_name": "IamVSM\/msdt-follina", "owner": { "login": "IamVSM", "id": 5747913, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5747913?v=4", "html_url": "https:\/\/github.com\/IamVSM" }, "html_url": "https:\/\/github.com\/IamVSM\/msdt-follina", "description": "Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 Attack Vector", "fork": false, "created_at": "2022-06-06T09:17:25Z", "updated_at": "2022-06-08T05:08:19Z", "pushed_at": "2022-06-06T09:17:28Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 500508968, "name": "FollinaPatcherCLI", "full_name": "Rojacur\/FollinaPatcherCLI", "owner": { "login": "Rojacur", "id": 106988270, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106988270?v=4", "html_url": "https:\/\/github.com\/Rojacur" }, "html_url": "https:\/\/github.com\/Rojacur\/FollinaPatcherCLI", "description": "Désactivation du protocole MSDT URL (CVE-2022-30190) avec gestion des erreurs et de l'exit code pour un déploiement en masse", "fork": false, "created_at": "2022-06-06T16:25:41Z", "updated_at": "2022-06-06T16:52:06Z", "pushed_at": "2022-06-07T11:09:03Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 500786615, "name": "CVE-2022-30190", "full_name": "joshuavanderpoll\/CVE-2022-30190", "owner": { "login": "joshuavanderpoll", "id": 16516497, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16516497?v=4", "html_url": "https:\/\/github.com\/joshuavanderpoll" }, "html_url": "https:\/\/github.com\/joshuavanderpoll\/CVE-2022-30190", "description": "Microsoft Support Diagnostic Tool (CVE-2022-30190)", "fork": false, "created_at": "2022-06-07T10:07:52Z", "updated_at": "2022-06-07T17:16:40Z", "pushed_at": "2022-06-07T10:10:39Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 500934660, "name": "Follina", "full_name": "abhirules27\/Follina", "owner": { "login": "abhirules27", "id": 23321239, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23321239?v=4", "html_url": "https:\/\/github.com\/abhirules27" }, "html_url": "https:\/\/github.com\/abhirules27\/Follina", "description": "Notes related to CVE-2022-30190", "fork": false, "created_at": "2022-06-07T17:11:57Z", "updated_at": "2022-06-07T17:11:57Z", "pushed_at": "2022-06-07T17:14:09Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 501026730, "name": "follina-spring", "full_name": "dsibilio\/follina-spring", "owner": { "login": "dsibilio", "id": 24280982, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24280982?v=4", "html_url": "https:\/\/github.com\/dsibilio" }, "html_url": "https:\/\/github.com\/dsibilio\/follina-spring", "description": "Server to host\/activate Follina payloads & generator of malicious Word documents exploiting the MS-MSDT protocol. (CVE-2022-30190)", "fork": false, "created_at": "2022-06-07T22:46:23Z", "updated_at": "2022-06-08T07:49:54Z", "pushed_at": "2022-06-14T20:30:12Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-30190", "cybersecurity", "follina", "infosec", "java", "mesdetty", "ms-msdt", "msdt", "spring", "spring-boot" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 501212142, "name": "Deathnote", "full_name": "Malwareman007\/Deathnote", "owner": { "login": "Malwareman007", "id": 86009160, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4", "html_url": "https:\/\/github.com\/Malwareman007" }, "html_url": "https:\/\/github.com\/Malwareman007\/Deathnote", "description": "Proof of Concept of CVE-2022-30190", "fork": false, "created_at": "2022-06-08T10:58:23Z", "updated_at": "2022-06-23T19:58:06Z", "pushed_at": "2022-06-08T14:25:51Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-30190", "follina", "microsoft", "msdt", "msword", "vulnerability", "zeroday" ], "visibility": "public", "forks": 1, "watchers": 7, "score": 0 }, { "id": 501283166, "name": "Follina-Workaround-CVE-2022-30190", "full_name": "sentrium-security\/Follina-Workaround-CVE-2022-30190", "owner": { "login": "sentrium-security", "id": 53477514, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53477514?v=4", "html_url": "https:\/\/github.com\/sentrium-security" }, "html_url": "https:\/\/github.com\/sentrium-security\/Follina-Workaround-CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-06-08T14:20:50Z", "updated_at": "2022-06-08T14:29:37Z", "pushed_at": "2022-06-08T15:08:52Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 501589039, "name": "Follina_Exploiter_CLI", "full_name": "Hrishikesh7665\/Follina_Exploiter_CLI", "owner": { "login": "Hrishikesh7665", "id": 57979686, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57979686?v=4", "html_url": "https:\/\/github.com\/Hrishikesh7665" }, "html_url": "https:\/\/github.com\/Hrishikesh7665\/Follina_Exploiter_CLI", "description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)", "fork": false, "created_at": "2022-06-09T09:32:10Z", "updated_at": "2022-06-22T23:25:08Z", "pushed_at": "2022-06-16T07:28:13Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-30190", "exploit", "follina", "micorsoft-office", "microsoft", "msdt", "rce", "remote-code-execution", "word" ], "visibility": "public", "forks": 3, "watchers": 7, "score": 0 }, { "id": 501598812, "name": "Clickstudio-compromised-certificate", "full_name": "b401\/Clickstudio-compromised-certificate", "owner": { "login": "b401", "id": 41926529, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41926529?v=4", "html_url": "https:\/\/github.com\/b401" }, "html_url": "https:\/\/github.com\/b401\/Clickstudio-compromised-certificate", "description": "Repository containing the compromised certificate seen in recent CVE-2022-30190 (Follina) attacks.", "fork": false, "created_at": "2022-06-09T10:03:06Z", "updated_at": "2022-06-09T10:06:44Z", "pushed_at": "2022-06-09T10:06:41Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 501848298, "name": "CVE-2022-30190", "full_name": "k508\/CVE-2022-30190", "owner": { "login": "k508", "id": 44594320, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44594320?v=4", "html_url": "https:\/\/github.com\/k508" }, "html_url": "https:\/\/github.com\/k508\/CVE-2022-30190", "description": "Mitigation for CVE-2022-30190", "fork": false, "created_at": "2022-06-10T00:23:11Z", "updated_at": "2022-06-10T00:25:47Z", "pushed_at": "2022-06-10T00:33:19Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 502029465, "name": "PicusSecurity4.Week.Repo", "full_name": "safakTamsesCS\/PicusSecurity4.Week.Repo", "owner": { "login": "safakTamsesCS", "id": 90156001, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90156001?v=4", "html_url": "https:\/\/github.com\/safakTamsesCS" }, "html_url": "https:\/\/github.com\/safakTamsesCS\/PicusSecurity4.Week.Repo", "description": "CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina ", "fork": false, "created_at": "2022-06-10T12:09:37Z", "updated_at": "2022-06-13T07:46:24Z", "pushed_at": "2022-06-12T20:45:42Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 502082566, "name": "follina_cve_2022-30190", "full_name": "amitniz\/follina_cve_2022-30190", "owner": { "login": "amitniz", "id": 25344020, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25344020?v=4", "html_url": "https:\/\/github.com\/amitniz" }, "html_url": "https:\/\/github.com\/amitniz\/follina_cve_2022-30190", "description": "proof of concept to CVE-2022-30190 (follina)", "fork": false, "created_at": "2022-06-10T14:57:17Z", "updated_at": "2022-06-13T07:42:03Z", "pushed_at": "2022-06-11T19:12:53Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-30190", "exploit", "follina", "poc", "remote-shell" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 502110629, "name": "CVE-2022-30190-Analysis-With-LetsDefends-Lab", "full_name": "Abdibimantara\/CVE-2022-30190-Analysis-With-LetsDefends-Lab", "owner": { "login": "Abdibimantara", "id": 43168046, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43168046?v=4", "html_url": "https:\/\/github.com\/Abdibimantara" }, "html_url": "https:\/\/github.com\/Abdibimantara\/CVE-2022-30190-Analysis-With-LetsDefends-Lab", "description": "this is my simple article about CVE 2022-30190 (Follina) analysis. I use the lab from Letsdefend.", "fork": false, "created_at": "2022-06-10T16:29:07Z", "updated_at": "2022-06-10T16:29:07Z", "pushed_at": "2022-06-10T16:37:46Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 502326888, "name": "CVE-2022-30190_Temporary_Fix", "full_name": "SrCroqueta\/CVE-2022-30190_Temporary_Fix", "owner": { "login": "SrCroqueta", "id": 32432079, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32432079?v=4", "html_url": "https:\/\/github.com\/SrCroqueta" }, "html_url": "https:\/\/github.com\/SrCroqueta\/CVE-2022-30190_Temporary_Fix", "description": "These are two Python scripts compiled to easily and quickly apply temporary protection against the CVE-2022-30190 vulnerability (Follina)", "fork": false, "created_at": "2022-06-11T11:16:56Z", "updated_at": "2022-06-15T10:21:00Z", "pushed_at": "2022-06-26T17:27:34Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 502600692, "name": "CVE-2022-30190_Temporary_Fix_Source_Code", "full_name": "SrCroqueta\/CVE-2022-30190_Temporary_Fix_Source_Code", "owner": { "login": "SrCroqueta", "id": 32432079, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32432079?v=4", "html_url": "https:\/\/github.com\/SrCroqueta" }, "html_url": "https:\/\/github.com\/SrCroqueta\/CVE-2022-30190_Temporary_Fix_Source_Code", "description": "These are the source codes of the Python scripts to apply the temporary protection against the CVE-2022-30190 vulnerability (Follina)", "fork": false, "created_at": "2022-06-12T11:48:22Z", "updated_at": "2022-06-15T10:20:20Z", "pushed_at": "2022-06-21T17:29:25Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 502803172, "name": "Follina-CVE-2022-30190-Unofficial-patch", "full_name": "SonicWave21\/Follina-CVE-2022-30190-Unofficial-patch", "owner": { "login": "SonicWave21", "id": 107382379, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107382379?v=4", "html_url": "https:\/\/github.com\/SonicWave21" }, "html_url": "https:\/\/github.com\/SonicWave21\/Follina-CVE-2022-30190-Unofficial-patch", "description": "An Unofficial Patch Follina CVE-2022-30190 (patch) by micrisoft Guidelines.", "fork": false, "created_at": "2022-06-13T04:20:02Z", "updated_at": "2022-06-14T13:22:08Z", "pushed_at": "2022-06-14T13:32:17Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "batch", "cve-2022-30190", "follina", "microsoft", "ms-msdt", "patch", "windows-10", "windows-11", "zero-day" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 503121339, "name": "CVE-2022-30190", "full_name": "XxToxicScriptxX\/CVE-2022-30190", "owner": { "login": "XxToxicScriptxX", "id": 72946006, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72946006?v=4", "html_url": "https:\/\/github.com\/XxToxicScriptxX" }, "html_url": "https:\/\/github.com\/XxToxicScriptxX\/CVE-2022-30190", "description": "Python file scanner created in 2021 scanning for known and potential vulns", "fork": false, "created_at": "2022-06-13T21:32:45Z", "updated_at": "2022-06-13T21:36:40Z", "pushed_at": "2022-06-13T21:36:37Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 503273195, "name": "CVE-2022-30190", "full_name": "ernestak\/CVE-2022-30190", "owner": { "login": "ernestak", "id": 97414565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97414565?v=4", "html_url": "https:\/\/github.com\/ernestak" }, "html_url": "https:\/\/github.com\/ernestak\/CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-06-14T08:29:40Z", "updated_at": "2022-06-14T08:29:40Z", "pushed_at": "2022-06-14T08:44:15Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 503292025, "name": "Sigma-Rule-for-CVE-2022-30190", "full_name": "ernestak\/Sigma-Rule-for-CVE-2022-30190", "owner": { "login": "ernestak", "id": 97414565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97414565?v=4", "html_url": "https:\/\/github.com\/ernestak" }, "html_url": "https:\/\/github.com\/ernestak\/Sigma-Rule-for-CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-06-14T09:27:37Z", "updated_at": "2022-06-14T09:27:37Z", "pushed_at": "2022-06-14T09:27:50Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 503586593, "name": "FollinaExtractor", "full_name": "MalwareTech\/FollinaExtractor", "owner": { "login": "MalwareTech", "id": 7256561, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7256561?v=4", "html_url": "https:\/\/github.com\/MalwareTech" }, "html_url": "https:\/\/github.com\/MalwareTech\/FollinaExtractor", "description": "Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files", "fork": false, "created_at": "2022-06-15T02:22:53Z", "updated_at": "2022-06-23T20:26:56Z", "pushed_at": "2022-06-15T02:24:00Z", "stargazers_count": 26, "watchers_count": 26, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 26, "score": 0 }, { "id": 503694177, "name": "follina-CVE-2022-30190", "full_name": "notherealhazard\/follina-CVE-2022-30190", "owner": { "login": "notherealhazard", "id": 106530435, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106530435?v=4", "html_url": "https:\/\/github.com\/notherealhazard" }, "html_url": "https:\/\/github.com\/notherealhazard\/follina-CVE-2022-30190", "description": null, "fork": false, "created_at": "2022-06-15T09:13:05Z", "updated_at": "2022-06-15T09:15:12Z", "pushed_at": "2022-06-15T11:01:19Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 503944049, "name": "follina-CVE-2022-30190", "full_name": "Cerebrovinny\/follina-CVE-2022-30190", "owner": { "login": "Cerebrovinny", "id": 52631834, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52631834?v=4", "html_url": "https:\/\/github.com\/Cerebrovinny" }, "html_url": "https:\/\/github.com\/Cerebrovinny\/follina-CVE-2022-30190", "description": "follina zero day vulnerability to help Microsoft to mitigate the attack", "fork": false, "created_at": "2022-06-15T22:49:21Z", "updated_at": "2022-06-16T00:04:19Z", "pushed_at": "2022-06-16T00:04:16Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 505099224, "name": "CVE-2022-30190-MASS-RCE", "full_name": "zir0x00\/CVE-2022-30190-MASS-RCE", "owner": { "login": "zir0x00", "id": 107797396, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107797396?v=4", "html_url": "https:\/\/github.com\/zir0x00" }, "html_url": "https:\/\/github.com\/zir0x00\/CVE-2022-30190-MASS-RCE", "description": "MSDT 0-Day Mass Exploitation Tool", "fork": false, "created_at": "2022-06-19T12:10:10Z", "updated_at": "2022-06-19T12:10:10Z", "pushed_at": "2022-06-19T12:11:29Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 507361626, "name": "Follina-CVE-2022-30190-PoC-sample", "full_name": "ethicalblue\/Follina-CVE-2022-30190-PoC-sample", "owner": { "login": "ethicalblue", "id": 82314652, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82314652?v=4", "html_url": "https:\/\/github.com\/ethicalblue" }, "html_url": "https:\/\/github.com\/ethicalblue\/Follina-CVE-2022-30190-PoC-sample", "description": "Educational Follina PoC Tool", "fork": false, "created_at": "2022-06-25T16:27:59Z", "updated_at": "2022-06-25T16:28:05Z", "pushed_at": "2022-06-25T16:33:59Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]