text
stringlengths 0
93.6k
|
---|
# pts = self.rotate(shape, move[2], [0,0]) # self.coord_current[0:2])
|
# new_shapes.append(pts)
|
# self.shapes = new_shapes
|
self.coord_current[0] += move[0]
|
self.coord_current[1] += move[1]
|
self.coord_current[2] += move[2]
|
self.anchors_rotated = self.rotate(self.anchors, self.coord_current[2], [0,0])
|
def Reset(self):
|
self.anchors = self.anchors_initial.copy()
|
self.coord_current = self.coord_initial.copy()
|
self.shapes = self.shapes_initial.copy()
|
self.holes = self.holes_initial.copy()
|
self.momentum = [0,0,0]
|
if __name__ == '__main__':
|
vp = Viewport()
|
pcb = Board()
|
pcb.Load()
|
nets = Nets()
|
nets.Load(pcb.net)
|
footprints = []
|
for i, mod in enumerate(pcb.module):
|
fp = Footprint(mod)
|
footprints.append(fp)
|
nets.Associate(footprints)
|
vp.Load(nets)
|
vp.Draw(footprints, nets, [])
|
vp.Start()
|
# <FILESEP>
|
#!/usr/bin/env python3
|
#
|
# fusée gelée
|
#
|
# Launcher for the {re}switched coldboot/bootrom hacks--
|
# launches payloads above the Horizon
|
#
|
# discovery and implementation by @ktemkin
|
# likely independently discovered by lots of others <3
|
#
|
# this code is political -- it stands with those who fight for LGBT rights
|
# don't like it? suck it up, or find your own damned exploit ^-^
|
#
|
# special thanks to:
|
# ScirèsM, motezazer -- guidance and support
|
# hedgeberg, andeor -- dumping the Jetson bootROM
|
# TuxSH -- for IDB notes that were nice to peek at
|
#
|
# much love to:
|
# Aurora Wright, Qyriad, f916253, MassExplosion213, Schala, and Levi
|
#
|
# greetings to:
|
# shuffle2
|
# This file is part of Fusée Launcher
|
# Copyright (C) 2018 Mikaela Szekely <[email protected]>
|
# Copyright (C) 2018 Kate Temkin <[email protected]>
|
# Fusée Launcher is licensed under the terms of the GNU GPLv2
|
import os
|
import sys
|
import errno
|
import ctypes
|
import argparse
|
import platform
|
# The address where the RCM payload is placed.
|
# This is fixed for most device.
|
RCM_PAYLOAD_ADDR = 0x40010000
|
# The address where the user payload is expected to begin.
|
PAYLOAD_START_ADDR = 0x40010E40
|
# Specify the range of addresses where we should inject oct
|
# payload address.
|
STACK_SPRAY_START = 0x40014E40
|
STACK_SPRAY_END = 0x40017000
|
# notes:
|
# GET_CONFIGURATION to the DEVICE triggers memcpy from 0x40003982
|
# GET_INTERFACE to the INTERFACE triggers memcpy from 0x40003984
|
# GET_STATUS to the ENDPOINT triggers memcpy from <on the stack>
|
class HaxBackend:
|
"""
|
Base class for backends for the TegraRCM vuln.
|
"""
|
# USB constants used
|
STANDARD_REQUEST_DEVICE_TO_HOST_TO_ENDPOINT = 0x82
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.