mirror of
https://github.com/diamante0018/MW3ProtocolExploit.git
synced 2025-04-19 20:32:52 +00:00
Readme
This commit is contained in:
parent
b103d322b7
commit
5d55f10177
13
README.md
13
README.md
@ -12,3 +12,16 @@ The exploit has since been mitigated, but the underlying bug in the client remai
|
|||||||
## How does this work?
|
## How does this work?
|
||||||
|
|
||||||
The exploit works by modifying the server name with a malicious string of characters. It will make any client crash.
|
The exploit works by modifying the server name with a malicious string of characters. It will make any client crash.
|
||||||
|
|
||||||
|
## Compile from source
|
||||||
|
|
||||||
|
- Clone the Git repo. Do NOT download it as ZIP, that won't work.
|
||||||
|
- Run `premake5 vs2019` or simply use the delivered `generate.bat`.
|
||||||
|
- Build via solution file in `build\server-list-exploit.sln`.
|
||||||
|
|
||||||
|
## Premake arguments
|
||||||
|
|
||||||
|
| Argument | Description |
|
||||||
|
|:----------------------------|:-----------------------------------------------|
|
||||||
|
| `--dev-build` | Do nothing. |
|
||||||
|
| `--copy-to` | Copy the EXE to a custom folder after build. |
|
||||||
|
Loading…
x
Reference in New Issue
Block a user