mirror of
https://github.com/diamante0018/MW3ProtocolExploit.git
synced 2025-04-19 04:22:53 +00:00
more cleaning
This commit is contained in:
parent
12c0d485e0
commit
fcc26bb76e
@ -16,5 +16,5 @@ The exploit works by modifying the server name with a malicious string of charac
|
||||
## Compile from source
|
||||
|
||||
- Clone the Git repo. Do NOT download it as ZIP, that won't work.
|
||||
- Run `premake5 vs2019` or simply use the delivered `generate.bat`.
|
||||
- Run `premake5 vs2022` or simply use the delivered `generate.bat`.
|
||||
- Build via solution file in `build\server-list-exploit.sln`.
|
||||
|
@ -1,3 +1,3 @@
|
||||
@echo off
|
||||
git submodule update --init --recursive
|
||||
call git submodule update --init --recursive
|
||||
call tools\premake5 %* vs2022
|
||||
|
Loading…
x
Reference in New Issue
Block a user