Skip to content

bvoris/SettingContent-MS-File-Execution

Repository files navigation

SettingContent-MS-File-Execution

SettingContent-MS File Execution vulnerability in Windows 10
Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10
Download and execute LoadWebsite.SettingContent-MS
Website will automatically load Internet Explorer, load a specific site and maximize the screen. This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload
Vulnerability first discovered by Matt Nelson
Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39

Created by: Brad Voris

Connect with me at

Victim Of Technology

GitHubGitHub commit activityGitHub All ReleasesGitHub repo sizeGitHub language countGitHub issuesGitHub top language

About

SettingContent-MS File Execution vulnerability in Windows 10

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published