From fcc26bb76efc7ce2a1a56ccc419d1520f0172b87 Mon Sep 17 00:00:00 2001 From: Diavolo Date: Wed, 7 Sep 2022 14:41:21 +0200 Subject: [PATCH] more cleaning --- README.md | 2 +- generate.bat | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 94339c0..1d921f7 100644 --- a/README.md +++ b/README.md @@ -16,5 +16,5 @@ The exploit works by modifying the server name with a malicious string of charac ## Compile from source - Clone the Git repo. Do NOT download it as ZIP, that won't work. -- Run `premake5 vs2019` or simply use the delivered `generate.bat`. +- Run `premake5 vs2022` or simply use the delivered `generate.bat`. - Build via solution file in `build\server-list-exploit.sln`. diff --git a/generate.bat b/generate.bat index fb09d6e..ef04c12 100644 --- a/generate.bat +++ b/generate.bat @@ -1,3 +1,3 @@ @echo off -git submodule update --init --recursive +call git submodule update --init --recursive call tools\premake5 %* vs2022