{"uuid": "c2a7aa9d-97c7-48ff-b81a-d5d2d3366971", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30190", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6797", "content": "#tools\n#Blue_Team_Techniques\n1. FollinaScanner - A tool that scans files &amp; directories for the Follina exploit (CVE-2022-30190)\nhttps://github.com/ErrorNoInternet/FollinaScanner\n2. On Challenges in Verifying Trusted Executable Files in Memory Forensics (+ .pdf)\nhttps://www.sciencedirect.com/science/article/pii/S2666281720300123?via%3Dihub\n]-&gt; Microsoft Authenticode:\nhttps://reversea.me/index.php/authenticode-i-understanding-windows-authenticode", "creation_timestamp": "2022-09-14T11:01:01.000000Z"}