LetterBomb web service implementation
Go to file
2018-10-30 17:43:49 +09:00
bundle Initial commit 2018-10-30 17:43:49 +09:00
log Initial commit 2018-10-30 17:43:49 +09:00
static Initial commit 2018-10-30 17:43:49 +09:00
templates Initial commit 2018-10-30 17:43:49 +09:00
.gitignore Initial commit 2018-10-30 17:43:49 +09:00
app.py Initial commit 2018-10-30 17:43:49 +09:00
config.py.sample Initial commit 2018-10-30 17:43:49 +09:00
country_regions.txt Initial commit 2018-10-30 17:43:49 +09:00
letterbomb.fcgi Initial commit 2018-10-30 17:43:49 +09:00
oui_list.txt Initial commit 2018-10-30 17:43:49 +09:00
README.md Initial commit 2018-10-30 17:43:49 +09:00
templateE.bin Initial commit 2018-10-30 17:43:49 +09:00
templateJ.bin Initial commit 2018-10-30 17:43:49 +09:00
templateK.bin Initial commit 2018-10-30 17:43:49 +09:00
templateU.bin Initial commit 2018-10-30 17:43:49 +09:00
update_oui.sh Initial commit 2018-10-30 17:43:49 +09:00

LetterBomb web service implementation

This is the LetterBomb Wii System Menu 4.3 exploit implementation running on https://please.hackmii.com/. Requires Python 2.7, Flask, and geoip2.

In case you're wondering, country_regions.txt is based on reporting data from Homebrew Channel updates. This was implemented because we found out that about 30% of our users are stupid and won't pick the correct system menu version (and then complain that it doesn't work), so we use GeoIP to guess the right default for them. Similarly, the MAC address check was implemented because people would type in garbage for the MAC address and then complain that it doesn't work.

This does not include the HackMii Installer bundle. Those files would go in bundle/.