shadowbrokers-exploits/windows/Resources/LegacyWindowsExploits/Exploits/ELV 2.1.3/exploit.cfg
2017-04-14 11:45:07 +02:00

3 lines
174 B
INI

name=ELV-EAGERLEVER (version 2.1.3.2)
command=run_ELV.pl
options=-t $targetIP -d $work_dir -f $payload_dll -x $payload_exe -e $exploit_dir -l $lp_dll -n $payload_exe_name