DeaD_EyE

pymodbus-codesys

Mar 11th, 2021
732
0
Never
1
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 0.37 KB | None | 0 0
  1. import time
  2. import struct
  3. from pymodbus.client.sync import ModbusTcpClient
  4.  
  5. Float = struct.Struct("<f")
  6.  
  7.  
  8. def float2word(value):
  9.     data = Float.pack(value)
  10.     return data[0] | data[1] << 8, data[2] | data[3] << 8
  11.    
  12.  
  13. with ModbusTcpClient("192.168.82.15") as client:
  14.     for i in range(0, 200):
  15.         client.write_registers(0, float2word(i / 200 * 100))
  16.  
Advertisement
Comments
  • homemmaldoso
    87 days
    # CSS 0.85 KB | 0 0
    1. ✅ Leaked Exploit Documentation:
    2.  
    3. https://docs.google.com/document/d/1dOCZEHS5JtM51RITOJzbS4o3hZ-__wTTRXQkV1MexNQ/edit?usp=sharing
    4.  
    5. This made me $13,000 in 2 days.
    6.  
    7. Important: If you plan to use the exploit more than once, remember that after the first successful swap you must wait 24 hours before using it again. Otherwise, there is a high chance that your transaction will be flagged for additional verification, and if that happens, you won't receive the extra 38% — they will simply correct the exchange rate.
    8. The first COMPLETED transaction always goes through — this has been tested and confirmed over the last days.
    9.  
    10. Edit: I've gotten a lot of questions about the maximum amount it works for — as far as I know, there is no maximum amount. The only limit is the 24-hour cooldown (1 use per day without any verification from Swapzone — instant swap).
Add Comment
Please, Sign In to add comment