Skip to content

Commit

Permalink
Serial matching for A8/A9 Exploit
Browse files Browse the repository at this point in the history
  • Loading branch information
KritantaDev authored and KritantaDev committed Feb 15, 2022
1 parent e626bbb commit 87b5ee3
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion checkm8.py
Original file line number Diff line number Diff line change
Expand Up @@ -683,7 +683,7 @@ def exploit(match=None):
print('(%0.2f seconds)' % (time.time() - start))
dfu.release_device(device)

def exploit_a8_a9():
def exploit_a8_a9(match=None):
print('*** checkm8 exploit by axi0mX ***')

device = dfu.acquire_device(match=match)
Expand Down
2 changes: 1 addition & 1 deletion ipwndfu
Original file line number Diff line number Diff line change
Expand Up @@ -169,7 +169,7 @@ def pwn(device=None, match_device=None):
elif serial.cpid in ['8947', '8950', '8960', '8002', '8004', '8010', '8011', '8012', '8015']:
checkm8.exploit(match=match_device)
elif serial.cpid in ['7000', '8000', '8003']:
checkm8.exploit_a8_a9()
checkm8.exploit_a8_a9(match=match_device)
else:
print('Found: ' + serial_number, file=sys.stderr)
print('ERROR: This device is not supported.', file=sys.stderr)
Expand Down

0 comments on commit 87b5ee3

Please sign in to comment.