diff --git a/README.md b/README.md index 94339c0..1d921f7 100644 --- a/README.md +++ b/README.md @@ -16,5 +16,5 @@ The exploit works by modifying the server name with a malicious string of charac ## Compile from source - Clone the Git repo. Do NOT download it as ZIP, that won't work. -- Run `premake5 vs2019` or simply use the delivered `generate.bat`. +- Run `premake5 vs2022` or simply use the delivered `generate.bat`. - Build via solution file in `build\server-list-exploit.sln`. diff --git a/generate.bat b/generate.bat index fb09d6e..ef04c12 100644 --- a/generate.bat +++ b/generate.bat @@ -1,3 +1,3 @@ @echo off -git submodule update --init --recursive +call git submodule update --init --recursive call tools\premake5 %* vs2022