mirror of
https://github.com/diamante0018/MW3ProtocolExploit.git
synced 2025-04-19 20:32:52 +00:00
more cleaning
This commit is contained in:
parent
12c0d485e0
commit
fcc26bb76e
@ -16,5 +16,5 @@ The exploit works by modifying the server name with a malicious string of charac
|
|||||||
## Compile from source
|
## Compile from source
|
||||||
|
|
||||||
- Clone the Git repo. Do NOT download it as ZIP, that won't work.
|
- Clone the Git repo. Do NOT download it as ZIP, that won't work.
|
||||||
- Run `premake5 vs2019` or simply use the delivered `generate.bat`.
|
- Run `premake5 vs2022` or simply use the delivered `generate.bat`.
|
||||||
- Build via solution file in `build\server-list-exploit.sln`.
|
- Build via solution file in `build\server-list-exploit.sln`.
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
@echo off
|
@echo off
|
||||||
git submodule update --init --recursive
|
call git submodule update --init --recursive
|
||||||
call tools\premake5 %* vs2022
|
call tools\premake5 %* vs2022
|
||||||
|
Loading…
x
Reference in New Issue
Block a user