LetterBomb web service implementation
Go to file
2021-04-03 15:50:31 +09:00
bundle Initial commit 2018-10-30 17:43:49 +09:00
log Initial commit 2018-10-30 17:43:49 +09:00
static Initial commit 2018-10-30 17:43:49 +09:00
templates Initial commit 2018-10-30 17:43:49 +09:00
.gitignore Initial commit 2018-10-30 17:43:49 +09:00
app.py Do not spam on geoip not found errors 2021-04-03 15:50:31 +09:00
config.py.sample Initial commit 2018-10-30 17:43:49 +09:00
COPYING Add COPYING 2018-10-30 17:46:24 +09:00
country_regions.txt Initial commit 2018-10-30 17:43:49 +09:00
oui_list.txt update oui_list.txt using update_oui.sh 2021-04-03 15:41:19 +09:00
README.md Add COPYING 2018-10-30 17:46:24 +09:00
templateE.bin Initial commit 2018-10-30 17:43:49 +09:00
templateJ.bin Initial commit 2018-10-30 17:43:49 +09:00
templateK.bin Initial commit 2018-10-30 17:43:49 +09:00
templateU.bin Initial commit 2018-10-30 17:43:49 +09:00
update_oui.sh Initial commit 2018-10-30 17:43:49 +09:00
wsgi.py added example usage of wsgi file 2021-04-03 15:41:19 +09:00

LetterBomb web service implementation

This is the LetterBomb Wii System Menu 4.3 exploit implementation running on https://please.hackmii.com/. Requires Python 2.7, Flask, and geoip2.

In case you're wondering, country_regions.txt is based on reporting data from Homebrew Channel updates. This was implemented because we found out that about 30% of our users are stupid and won't pick the correct system menu version (and then complain that it doesn't work), so we use GeoIP to guess the right default for them. Similarly, the MAC address check was implemented because people would type in garbage for the MAC address and then complain that it doesn't work.

This does not include the HackMii Installer bundle. Those files would go in bundle/.

License

GPL-2.0