stUpiidhax, the Wii U 5.5.2 exploit (based on JSTypeHax) http://stupiid.ovh/

codebin2js_DEV.py 1.2KB

12345678910111213141516171819202122232425262728293031323334353637383940414243
  1. import struct
  2. j = 0;
  3. payload = "[\n"
  4. """
  5. try:
  6. f = open("wiiuhaxx_loader.bin", "rb")
  7. while True:
  8. B = struct.unpack(">B", f.read(1))[0];
  9. payload += "0x%02x, " % (B)
  10. j+=1
  11. except:
  12. payload += "\n"
  13. for i in range(j&0x03):
  14. payload += "0x00, "
  15. payload += "\n"
  16. #print "0x48, 0x00, 0x00, 0x05, 0x7c, 0x68, 0x02, 0xa6, 0x38, 0x80, 0x00, 0x48, 0x7c, 0x84, 0x1a, 0x14, 0x80, 0xa4, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x7f, 0xa3, 0xeb, 0x78, 0x38, 0xc0, 0x00, 0x02, 0x7c, 0xa5, 0x34, 0x30, 0x7c, 0xa9, 0x03, 0xa6, 0x80, 0xa4, 0x00, 0x00, 0x90, 0xa3, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x38, 0x63, 0x00, 0x04, 0x42, 0x00, 0xff, 0xf0, 0x7c, 0x21, 0xf2, 0x14, 0x80, 0x61, 0x00, 0x04, 0x7c, 0x69, 0x03, 0xa6, 0x4e, 0x80, 0x04, 0x20,"
  17. payload += "0x00, 0x10, 0x00, 0x00,\n"
  18. j+=4
  19. """
  20. try:
  21. f = open("codeloader.bin", "rb")
  22. while True:
  23. B = struct.unpack(">B", f.read(1))[0];
  24. payload += "0x%02x, " % (B)
  25. j+=1
  26. except:
  27. payload += ""
  28. for i in range(j&0x03):
  29. payload += "0x00,"
  30. payload += "\n"
  31. #padding
  32. for i in range(j, 0x1000-4, 4):
  33. payload += "0x60, 0x00, 0x00, 0x00, "
  34. payload += "\n"
  35. payload += "]"
  36. print payload