Minor update to exploit code. Need to document it
This commit is contained in:
parent
926453f0ea
commit
cc30c9ca57
BIN
__pycache__/patches.cpython-310.pyc
Normal file
BIN
__pycache__/patches.cpython-310.pyc
Normal file
Binary file not shown.
BIN
__pycache__/utils.cpython-310.pyc
Normal file
BIN
__pycache__/utils.cpython-310.pyc
Normal file
Binary file not shown.
@ -303,14 +303,19 @@ if __name__ == "__main__":
|
|||||||
parser = argparse.ArgumentParser()
|
parser = argparse.ArgumentParser()
|
||||||
parser.add_argument("payload", help="Payload to send to the tablet")
|
parser.add_argument("payload", help="Payload to send to the tablet")
|
||||||
parser.add_argument("--ga", help="Prepare for GA", action="store_true")
|
parser.add_argument("--ga", help="Prepare for GA", action="store_true")
|
||||||
|
parser.add_argument("--ga_arm", help="Prepare for GA", action="store_true")
|
||||||
|
|
||||||
args = parser.parse_args()
|
args = parser.parse_args()
|
||||||
rcm = TegraRCM()
|
rcm = TegraRCM()
|
||||||
rcm.dev.read_chip_id()
|
rcm.dev.read_chip_id()
|
||||||
|
if args.ga_arm:
|
||||||
|
args.ga = True
|
||||||
|
rcm.send_payload(args.payload, thumb=0)
|
||||||
|
else:
|
||||||
rcm.send_payload(args.payload)
|
rcm.send_payload(args.payload)
|
||||||
if args.ga:
|
if args.ga:
|
||||||
d = rcm.dev.read(4)
|
d = rcm.dev.read(4)
|
||||||
d2 = rcm.dev.read(0x200)
|
# d2 = rcm.dev.read(0x200)
|
||||||
if d == b"GiAs":
|
if d == b"GiAs":
|
||||||
ok("Device in GA debugger")
|
ok("Device in GA debugger")
|
||||||
else:
|
else:
|
||||||
|
Loading…
Reference in New Issue
Block a user