SettingContent-MS-File-Execution icon indicating copy to clipboard operation
SettingContent-MS-File-Execution copied to clipboard

SettingContent-MS File Execution vulnerability in Windows 10

SettingContent-MS-File-Execution

SettingContent-MS File Execution vulnerability in Windows 10 <BR /> Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10 <BR /> Download and execute LoadWebsite.SettingContent-MS <BR /> Website will automatically load Internet Explorer, load a specific site and maximize the screen. This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload <BR /> Vulnerability first discovered by Matt Nelson <BR /> Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39

Created by: Brad Voris<BR /> GitHub GitHub commit activity GitHub All Releases GitHub repo size GitHub language count GitHub issues GitHub top language

Connect with me at

<IMG SRC="https://github.com/bvoris/bvoris/blob/master/twitter.jpg" WIDTH=10% HEIGHT=10% ALIGN=LEFT>

<IMG SRC="https://github.com/bvoris/bvoris/blob/master/linkedin.png" WIDTH=10% HEIGHT=4% ALIGN=RIGHT>

<BR /><BR /> <BR /><BR />

<A HREF="https://www.victimoftechnology.com">Victim Of Technology<A /> <BR /><BR /> <A HREF="https://www.cyberforgesecurity.com">Cyber Forge Security, Inc.<A /> <BR /><BR />