Ver código fonte

payload craft

pull/1/head
Winbagility 2 anos atrás
pai
commit
712a9ee46b
4 arquivos alterados com 17 adições e 11 exclusões
  1. 5
    4
      codebin2js.py
  2. 8
    4
      exploit.html
  3. 4
    3
      payload.js
  4. BIN
      wiiuhaxx_loader.bin

+ 5
- 4
codebin2js.py Ver arquivo

@@ -9,7 +9,7 @@ for i in range(0x2000):
print ""
"""
print "["
"""
try:
f = open("wiiuhaxx_loader.bin", "rb")
while True:
@@ -22,9 +22,10 @@ except:
for i in range(j&0x03):
print "0x00, "
print ""
"""
print "0x48, 0x00, 0x00, 0x05, 0x7c, 0x68, 0x02, 0xa6, 0x38, 0x80, 0x00, 0x48, 0x7c, 0x84, 0x1a, 0x14, 0x80, 0xa4, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x7f, 0xa3, 0xeb, 0x78, 0x38, 0xc0, 0x00, 0x02, 0x7c, 0xa5, 0x34, 0x30, 0x7c, 0xa9, 0x03, 0xa6, 0x80, 0xa4, 0x00, 0x00, 0x90, 0xa3, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x38, 0x63, 0x00, 0x04, 0x42, 0x00, 0xff, 0xf0, 0x7c, 0x21, 0xf2, 0x14, 0x80, 0x61, 0x00, 0x04, 0x7c, 0x69, 0x03, 0xa6, 0x4e, 0x80, 0x04, 0x20,"
print "0x00, 0x40, 0x00, 0x00,"

#print "0x48, 0x00, 0x00, 0x05, 0x7c, 0x68, 0x02, 0xa6, 0x38, 0x80, 0x00, 0x48, 0x7c, 0x84, 0x1a, 0x14, 0x80, 0xa4, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x7f, 0xa3, 0xeb, 0x78, 0x38, 0xc0, 0x00, 0x02, 0x7c, 0xa5, 0x34, 0x30, 0x7c, 0xa9, 0x03, 0xa6, 0x80, 0xa4, 0x00, 0x00, 0x90, 0xa3, 0x00, 0x00, 0x38, 0x84, 0x00, 0x04, 0x38, 0x63, 0x00, 0x04, 0x42, 0x00, 0xff, 0xf0, 0x7c, 0x21, 0xf2, 0x14, 0x80, 0x61, 0x00, 0x04, 0x7c, 0x69, 0x03, 0xa6, 0x4e, 0x80, 0x04, 0x20,"
print "0x00, 0x50, 0x00, 0x00,"
j+=4
try:
f = open("code550.bin", "rb")

+ 8
- 4
exploit.html
Diferenças do arquivo suprimidas por serem muito extensas
Ver arquivo


+ 4
- 3
payload.js
Diferenças do arquivo suprimidas por serem muito extensas
Ver arquivo


BIN
wiiuhaxx_loader.bin Ver arquivo


Carregando…
Cancelar
Salvar