text
stringlengths
0
93.6k
# pts = self.rotate(shape, move[2], [0,0]) # self.coord_current[0:2])
# new_shapes.append(pts)
# self.shapes = new_shapes
self.coord_current[0] += move[0]
self.coord_current[1] += move[1]
self.coord_current[2] += move[2]
self.anchors_rotated = self.rotate(self.anchors, self.coord_current[2], [0,0])
def Reset(self):
self.anchors = self.anchors_initial.copy()
self.coord_current = self.coord_initial.copy()
self.shapes = self.shapes_initial.copy()
self.holes = self.holes_initial.copy()
self.momentum = [0,0,0]
if __name__ == '__main__':
vp = Viewport()
pcb = Board()
pcb.Load()
nets = Nets()
nets.Load(pcb.net)
footprints = []
for i, mod in enumerate(pcb.module):
fp = Footprint(mod)
footprints.append(fp)
nets.Associate(footprints)
vp.Load(nets)
vp.Draw(footprints, nets, [])
vp.Start()
# <FILESEP>
#!/usr/bin/env python3
#
# fusée gelée
#
# Launcher for the {re}switched coldboot/bootrom hacks--
# launches payloads above the Horizon
#
# discovery and implementation by @ktemkin
# likely independently discovered by lots of others <3
#
# this code is political -- it stands with those who fight for LGBT rights
# don't like it? suck it up, or find your own damned exploit ^-^
#
# special thanks to:
# ScirèsM, motezazer -- guidance and support
# hedgeberg, andeor -- dumping the Jetson bootROM
# TuxSH -- for IDB notes that were nice to peek at
#
# much love to:
# Aurora Wright, Qyriad, f916253, MassExplosion213, Schala, and Levi
#
# greetings to:
# shuffle2
# This file is part of Fusée Launcher
# Copyright (C) 2018 Mikaela Szekely <[email protected]>
# Copyright (C) 2018 Kate Temkin <[email protected]>
# Fusée Launcher is licensed under the terms of the GNU GPLv2
import os
import sys
import errno
import ctypes
import argparse
import platform
# The address where the RCM payload is placed.
# This is fixed for most device.
RCM_PAYLOAD_ADDR = 0x40010000
# The address where the user payload is expected to begin.
PAYLOAD_START_ADDR = 0x40010E40
# Specify the range of addresses where we should inject oct
# payload address.
STACK_SPRAY_START = 0x40014E40
STACK_SPRAY_END = 0x40017000
# notes:
# GET_CONFIGURATION to the DEVICE triggers memcpy from 0x40003982
# GET_INTERFACE to the INTERFACE triggers memcpy from 0x40003984
# GET_STATUS to the ENDPOINT triggers memcpy from <on the stack>
class HaxBackend:
"""
Base class for backends for the TegraRCM vuln.
"""
# USB constants used
STANDARD_REQUEST_DEVICE_TO_HOST_TO_ENDPOINT = 0x82