text stringlengths 0 93.6k |
|---|
# pts = self.rotate(shape, move[2], [0,0]) # self.coord_current[0:2]) |
# new_shapes.append(pts) |
# self.shapes = new_shapes |
self.coord_current[0] += move[0] |
self.coord_current[1] += move[1] |
self.coord_current[2] += move[2] |
self.anchors_rotated = self.rotate(self.anchors, self.coord_current[2], [0,0]) |
def Reset(self): |
self.anchors = self.anchors_initial.copy() |
self.coord_current = self.coord_initial.copy() |
self.shapes = self.shapes_initial.copy() |
self.holes = self.holes_initial.copy() |
self.momentum = [0,0,0] |
if __name__ == '__main__': |
vp = Viewport() |
pcb = Board() |
pcb.Load() |
nets = Nets() |
nets.Load(pcb.net) |
footprints = [] |
for i, mod in enumerate(pcb.module): |
fp = Footprint(mod) |
footprints.append(fp) |
nets.Associate(footprints) |
vp.Load(nets) |
vp.Draw(footprints, nets, []) |
vp.Start() |
# <FILESEP> |
#!/usr/bin/env python3 |
# |
# fusée gelée |
# |
# Launcher for the {re}switched coldboot/bootrom hacks-- |
# launches payloads above the Horizon |
# |
# discovery and implementation by @ktemkin |
# likely independently discovered by lots of others <3 |
# |
# this code is political -- it stands with those who fight for LGBT rights |
# don't like it? suck it up, or find your own damned exploit ^-^ |
# |
# special thanks to: |
# ScirèsM, motezazer -- guidance and support |
# hedgeberg, andeor -- dumping the Jetson bootROM |
# TuxSH -- for IDB notes that were nice to peek at |
# |
# much love to: |
# Aurora Wright, Qyriad, f916253, MassExplosion213, Schala, and Levi |
# |
# greetings to: |
# shuffle2 |
# This file is part of Fusée Launcher |
# Copyright (C) 2018 Mikaela Szekely <qyriad@gmail.com> |
# Copyright (C) 2018 Kate Temkin <k@ktemkin.com> |
# Fusée Launcher is licensed under the terms of the GNU GPLv2 |
import os |
import sys |
import errno |
import ctypes |
import argparse |
import platform |
# The address where the RCM payload is placed. |
# This is fixed for most device. |
RCM_PAYLOAD_ADDR = 0x40010000 |
# The address where the user payload is expected to begin. |
PAYLOAD_START_ADDR = 0x40010E40 |
# Specify the range of addresses where we should inject oct |
# payload address. |
STACK_SPRAY_START = 0x40014E40 |
STACK_SPRAY_END = 0x40017000 |
# notes: |
# GET_CONFIGURATION to the DEVICE triggers memcpy from 0x40003982 |
# GET_INTERFACE to the INTERFACE triggers memcpy from 0x40003984 |
# GET_STATUS to the ENDPOINT triggers memcpy from <on the stack> |
class HaxBackend: |
""" |
Base class for backends for the TegraRCM vuln. |
""" |
# USB constants used |
STANDARD_REQUEST_DEVICE_TO_HOST_TO_ENDPOINT = 0x82 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.