# Standalone payload.elf loader This is .rpx is meant to run in a envrionment with sd and codegen (jit) access. It's exploits the Cafe OS and maps 8 MiB of usable memory from 0x30000000...0x30800000 (physical address) to 0x00800000... 0x01000000 (virtual address) where a payload will be loaded. You may need to hook into the kernel and patch out some thing to gain persistent access to this area. The loaded `payload.elf` needs to be mapped to this memory area. ## Usage Put the `payload.elf` in the `sd:/wiiu/` folder of your sd card and start the application. If no `payload.elf` was found on the sd card, a IOSU exploit will be executed which forces the `default title id` to the Wii U Menu (in case of `system.xml` changes) ## Building Make you to have [wut](https://github.com/devkitPro/wut/) installed and use the following command for build: ``` make ``` ## Building using the Dockerfile It's possible to use a docker image for building. This way you don't need anything installed on your host system. ``` # Build docker image (only needed once) docker build . -t payloadfromrpx-builder # make docker run -it --rm -v ${PWD}:/project payloadfromrpx-builder make # make clean docker run -it --rm -v ${PWD}:/project payloadfromrpx-builder make clean ``` ## Credits - orboditilt - Maschell - many many more Parts taken from: - https://github.com/FIX94/haxchi - https://github.com/dimok789/mocha - https://github.com/dimok789/homebrew_launcher - https://github.com/wiiudev/libwiiu/blob/master/kernel/gx2sploit/ [...]