shadowbrokers-exploits/windows/Resources/LegacyWindowsExploits/Exploits/ELV 2.1.3/exploit.cfg

4 lines
174 B
INI
Raw Normal View History

name=ELV-EAGERLEVER (version 2.1.3.2)
command=run_ELV.pl
options=-t $targetIP -d $work_dir -f $payload_dll -x $payload_exe -e $exploit_dir -l $lp_dll -n $payload_exe_name