Closed kevensen closed 7 years ago
I think there are two parts to this
A command line option to note in the curated exploit what command is needed to compile/stage the exploit.
A command line option to execute the staging.
Then of course the necessary functionality to back the CLI.
I think there are two parts to this
A command line option to note in the curated exploit what command is needed to compile/stage the exploit.
A command line option to execute the staging.
Then of course the necessary functionality to back the CLI.