source | ||
.gitignore | ||
Dockerfile | ||
Makefile | ||
README.md |
Standalone payload.elf loader
This is .rpx is meant to run in a envrionment with sd and codegen (jit) access.
It's exploits the Cafe OS and maps 8 MiB of usable memory from 0x30000000...0x30800000 (physical address) to 0x00800000... 0x01000000 (virtual address) where a payload will be loaded. You may need to hook into the kernel and patch out some thing to gain persistent access to this area.
The loaded payload.elf
needs to be mapped to this memory area.
Usage
Put the payload.elf
in the sd:/wiiu/
folder of your sd card and start the application.
If no payload.elf
was found on the sd card, a IOSU exploit will be executed which forces the default title id
to the Wii U Menu (in case of system.xml
changes)
Building
Make you to have wut installed and use the following command for build:
make
Building using the Dockerfile
It's possible to use a docker image for building. This way you don't need anything installed on your host system.
# Build docker image (only needed once)
docker build . -t payloadfromrpx-builder
# make
docker run -it --rm -v ${PWD}:/project payloadfromrpx-builder make
# make clean
docker run -it --rm -v ${PWD}:/project payloadfromrpx-builder make clean
Credits
- orboditilt
- Maschell
- many many more
Parts taken from: