mirror of
https://github.com/diamante0018/MW3ProtocolExploit.git
synced 2025-04-19 12:32:52 +00:00
Readme
This commit is contained in:
parent
b103d322b7
commit
5d55f10177
15
README.md
15
README.md
@ -11,4 +11,17 @@ The exploit has since been mitigated, but the underlying bug in the client remai
|
||||
|
||||
## How does this work?
|
||||
|
||||
The exploit works by modifying the server name with a malicious string of characters. It will make any client crash.
|
||||
The exploit works by modifying the server name with a malicious string of characters. It will make any client crash.
|
||||
|
||||
## Compile from source
|
||||
|
||||
- Clone the Git repo. Do NOT download it as ZIP, that won't work.
|
||||
- Run `premake5 vs2019` or simply use the delivered `generate.bat`.
|
||||
- Build via solution file in `build\server-list-exploit.sln`.
|
||||
|
||||
## Premake arguments
|
||||
|
||||
| Argument | Description |
|
||||
|:----------------------------|:-----------------------------------------------|
|
||||
| `--dev-build` | Do nothing. |
|
||||
| `--copy-to` | Copy the EXE to a custom folder after build. |
|
||||
|
Loading…
x
Reference in New Issue
Block a user