From 31415dbf4ef4f84d94d6ab1f7c096e487be6fdd0 Mon Sep 17 00:00:00 2001 From: d3adc0de Date: Thu, 16 Sep 2021 12:15:57 +0100 Subject: [PATCH] Added install instructions --- README.md | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) diff --git a/README.md b/README.md index ea843ba..8f86197 100644 --- a/README.md +++ b/README.md @@ -72,6 +72,29 @@ on this. Up to the curious reader to develop this further. The utility `cab_parser.py` can be used to see the headers of the exploit file, but don't consider this a full parser. It's a very quick and dirty CAB header viewer I developed to understand what was going on. +# Install + +The generator is designed to work on Windows, as it uses the `makecab` utility. Before usage, be sure to install required dependencies: + +* With Virtualenv + +``` +git clone https://github.com/klezVirus/CVE-2021-40444 +cd CVE-2021-40444 +pip install virtualenv +python -m virtualenv venv +venv\Scripts\activate.bat +pip install -r requirements +``` + +* Without Virtualenv + +``` +git clone https://github.com/klezVirus/CVE-2021-40444 +cd CVE-2021-40444 +pip install -r requirements +``` + # Usage The generator is trivial to use, and has been tested with a number of different DLL payloads.