Browse Source

1/2

pull/2/head
Winbagility 2 years ago
parent
commit
48e58e1a88
4 changed files with 68 additions and 16 deletions
  1. +15
    -12
      codebin2js.py
  2. +43
    -0
      codebin2js_DEV.py
  3. +7
    -2
      payload.js
  4. +3
    -2
      payload/exploit_WORKING.html

+ 15
- 12
codebin2js.py View File

@@ -1,9 +1,10 @@
import struct
import os


j = 0;

payload = "[\n"
"""
payload = ""
try:
f = open("wiiuhaxx_loader.bin", "rb")
while True:
@@ -17,12 +18,11 @@ for i in range(j&0x03):
payload += "0x00, "
payload += "\n"

#print "0x48, 0x00, 0x00, 0x05, 0x7c, 0x68, 0x02, 0xa6, 0x38, 0x80, 0x00, 0x48, 0x7c, 0x84, 0x1a, 0x14, 0x80, 0xa4, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x7f, 0xa3, 0xeb, 0x78, 0x38, 0xc0, 0x00, 0x02, 0x7c, 0xa5, 0x34, 0x30, 0x7c, 0xa9, 0x03, 0xa6, 0x80, 0xa4, 0x00, 0x00, 0x90, 0xa3, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x38, 0x63, 0x00, 0x04, 0x42, 0x00, 0xff, 0xf0, 0x7c, 0x21, 0xf2, 0x14, 0x80, 0x61, 0x00, 0x04, 0x7c, 0x69, 0x03, 0xa6, 0x4e, 0x80, 0x04, 0x20,"
payload += "0x00, 0x10, 0x00, 0x00,\n"
payload += "0x00, 0x40, 0x00, 0x00,\n"
j+=4
"""
try:
f = open("codeloader.bin", "rb")
f = open("code550.bin", "rb")
while True:
B = struct.unpack(">B", f.read(1))[0];
payload += "0x%02x, " % (B)
@@ -34,10 +34,13 @@ for i in range(j&0x03):
payload += "0x00,"
payload += "\n"

#padding
for i in range(j, 0x1000-4, 4):
payload += "0x60, 0x00, 0x00, 0x00, "
payload += "\n"
payload += "]"
#nop
nop = "";
for i in range(j, 0x4000-4, 4):
nop += "0x60, 0x00, 0x00, 0x00, "
nop += "\n"

print payload
print "["
print nop
print payload
print "]"

+ 43
- 0
codebin2js_DEV.py View File

@@ -0,0 +1,43 @@
import struct

j = 0;

payload = "[\n"
"""
try:
f = open("wiiuhaxx_loader.bin", "rb")
while True:
B = struct.unpack(">B", f.read(1))[0];
payload += "0x%02x, " % (B)
j+=1
except:
payload += "\n"

for i in range(j&0x03):
payload += "0x00, "
payload += "\n"

#print "0x48, 0x00, 0x00, 0x05, 0x7c, 0x68, 0x02, 0xa6, 0x38, 0x80, 0x00, 0x48, 0x7c, 0x84, 0x1a, 0x14, 0x80, 0xa4, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x7f, 0xa3, 0xeb, 0x78, 0x38, 0xc0, 0x00, 0x02, 0x7c, 0xa5, 0x34, 0x30, 0x7c, 0xa9, 0x03, 0xa6, 0x80, 0xa4, 0x00, 0x00, 0x90, 0xa3, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x38, 0x63, 0x00, 0x04, 0x42, 0x00, 0xff, 0xf0, 0x7c, 0x21, 0xf2, 0x14, 0x80, 0x61, 0x00, 0x04, 0x7c, 0x69, 0x03, 0xa6, 0x4e, 0x80, 0x04, 0x20,"
payload += "0x00, 0x10, 0x00, 0x00,\n"
j+=4
"""
try:
f = open("codeloader.bin", "rb")
while True:
B = struct.unpack(">B", f.read(1))[0];
payload += "0x%02x, " % (B)
j+=1
except:
payload += ""
for i in range(j&0x03):
payload += "0x00,"
payload += "\n"

#padding
for i in range(j, 0x1000-4, 4):
payload += "0x60, 0x00, 0x00, 0x00, "
payload += "\n"
payload += "]"

print payload

+ 7
- 2
payload.js
File diff suppressed because it is too large
View File


+ 3
- 2
payload/exploit_WORKING.html
File diff suppressed because it is too large
View File


Loading…
Cancel
Save