Skip to content

Latest commit

 

History

History
34 lines (25 loc) · 1.99 KB

File metadata and controls

34 lines (25 loc) · 1.99 KB

SettingContent-MS-File-Execution

SettingContent-MS File Execution vulnerability in Windows 10
Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10
Download and execute LoadWebsite.SettingContent-MS
Website will automatically load Internet Explorer, load a specific site and maximize the screen. This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload
Vulnerability first discovered by Matt Nelson
Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39

Created by: Brad Voris
GitHub GitHub commit activity GitHub All Releases GitHub repo size GitHub language count GitHub issues GitHub top language

Connect with me at





Victim Of Technology

Cyber Forge Security, Inc.