shadowbrokers-exploits/windows/Resources/Ops/Aliases/processdeep.xml
2017-04-14 11:45:07 +02:00

13 lines
387 B
XML

<?xml version="1.1" ?>
<Aliases>
<Alias>
<Name>processdeep</Name>
<Location>Remote</Location>
<ReplaceBeforeArgs>python Lib/ops/survey/processdeep.py -project Ops -args "</ReplaceBeforeArgs>
<ReplaceAfterArgs>"</ReplaceAfterArgs>
<Help>Usage:
processdeep
Executes: python Lib/ops/survey/processdeep.py -project Ops
Runs process deep.</Help>
</Alias>
</Aliases>