Skip to content

bvoris/SettingContent-MS-File-Execution

Repository files navigation

SettingContent-MS-File-Execution

SettingContent-MS File Execution vulnerability in Windows 10
Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10
Download and execute LoadWebsite.SettingContent-MS
Website will automatically load Internet Explorer, load a specific site and maximize the screen. This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload
Vulnerability first discovered by Matt Nelson
Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39

Created by: Brad Voris
GitHub GitHub commit activity GitHub All Releases GitHub repo size GitHub language count GitHub issues GitHub top language

Connect with me at





Victim Of Technology

Cyber Forge Security, Inc.

About

SettingContent-MS File Execution vulnerability in Windows 10

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published