1
0
Fork 0
mirror of https://github.com/klezVirus/CVE-2021-40444.git synced 2024-11-21 13:00:48 +00:00

Added install instructions

This commit is contained in:
d3adc0de 2021-09-16 12:15:57 +01:00
parent a74cce9d78
commit 31415dbf4e

View file

@ -72,6 +72,29 @@ on this. Up to the curious reader to develop this further.
The utility `cab_parser.py` can be used to see the headers of the exploit file, but don't consider this a full
parser. It's a very quick and dirty CAB header viewer I developed to understand what was going on.
# Install
The generator is designed to work on Windows, as it uses the `makecab` utility. Before usage, be sure to install required dependencies:
* With Virtualenv
```
git clone https://github.com/klezVirus/CVE-2021-40444
cd CVE-2021-40444
pip install virtualenv
python -m virtualenv venv
venv\Scripts\activate.bat
pip install -r requirements
```
* Without Virtualenv
```
git clone https://github.com/klezVirus/CVE-2021-40444
cd CVE-2021-40444
pip install -r requirements
```
# Usage
The generator is trivial to use, and has been tested with a number of different DLL payloads.