PayloadFromRPX/README.md
2020-07-22 15:24:30 +02:00

1.5 KiB

Standalone payload.elf loader

This is .rpx is meant to run in a envrionment with sd and codegen (jit) access. It's exploits the Cafe OS and maps 8 MiB of usable memory from 0x30000000...0x30800000 (physical address) to 0x00800000... 0x01000000 (virtual address) where a payload will be loaded. You may need to hook into the kernel and patch out some thing to gain persistent access to this area. The loaded payload.elf needs to be mapped to this memory area.

Usage

Put the payload.elf in the sd:/wiiu/ folder of your sd card and start the application. If no payload.elf was found on the sd card, a IOSU exploit will be executed which forces the default title id to the Wii U Menu (in case of system.xml changes)

Building

Make you to have wut installed and use the following command for build:

make

Building using the Dockerfile

It's possible to use a docker image for building. This way you don't need anything installed on your host system.

# Build docker image (only needed once)
docker build . -t payloadfromrpx-builder

# make 
docker run -it --rm -v ${PWD}:/project payloadfromrpx-builder make

# make clean
docker run -it --rm -v ${PWD}:/project payloadfromrpx-builder make clean

Credits

  • orboditilt
  • Maschell
  • many many more

Parts taken from: