BigNerd95 / Chimay-Red

Working POC of Mikrotik exploit from Vault 7 CIA Leaks
649 stars 216 forks source link

Python 2.7 virtual environment setup + some PEP8 fixes #14

Closed sv0 closed 4 years ago

sv0 commented 6 years ago

Hey Lorenzo, You have done greate work. But I have faced some problems while trying to use the exploit. Some python files in the project use python2, another ones use python3 Some dependencies of this project is only Python2 compatible. pwntools, for example.

So I added some steps to README.md describing how to set up Python2 virtual env and install all packages needed for exploit work.

Also there are some PEP8 fixes.

BigNerd95 commented 6 years ago

So i should convert stach clash mips and ectract users too? No way

I think i'll convert stack clash x86 to py3 using ropper