mirror of
https://github.com/klezVirus/CVE-2021-40444.git
synced 2024-11-21 13:00:48 +00:00
Added install instructions
This commit is contained in:
parent
a74cce9d78
commit
31415dbf4e
1 changed files with 23 additions and 0 deletions
23
README.md
23
README.md
|
@ -72,6 +72,29 @@ on this. Up to the curious reader to develop this further.
|
|||
The utility `cab_parser.py` can be used to see the headers of the exploit file, but don't consider this a full
|
||||
parser. It's a very quick and dirty CAB header viewer I developed to understand what was going on.
|
||||
|
||||
# Install
|
||||
|
||||
The generator is designed to work on Windows, as it uses the `makecab` utility. Before usage, be sure to install required dependencies:
|
||||
|
||||
* With Virtualenv
|
||||
|
||||
```
|
||||
git clone https://github.com/klezVirus/CVE-2021-40444
|
||||
cd CVE-2021-40444
|
||||
pip install virtualenv
|
||||
python -m virtualenv venv
|
||||
venv\Scripts\activate.bat
|
||||
pip install -r requirements
|
||||
```
|
||||
|
||||
* Without Virtualenv
|
||||
|
||||
```
|
||||
git clone https://github.com/klezVirus/CVE-2021-40444
|
||||
cd CVE-2021-40444
|
||||
pip install -r requirements
|
||||
```
|
||||
|
||||
# Usage
|
||||
|
||||
The generator is trivial to use, and has been tested with a number of different DLL payloads.
|
||||
|
|
Loading…
Reference in a new issue