shadowbrokers-exploits/windows/Resources/LegacyWindowsExploits/Exploits/ESKE 1.6.2/exploit.cfg
2017-04-14 11:45:07 +02:00

3 lines
176 B
INI

name=ESKE-ESSAYKEYNOTE (version 1.6.2)
command=run_ESKE.pl
options=-t $targetIP -d $work_dir -f $payload_dll -x $payload_exe -e $exploit_dir -l $lp_dll -n $payload_exe_name