Go to file
2020-07-22 15:24:20 +02:00
source Use raw2c instead of xxd 2020-07-22 15:16:42 +02:00
.gitignore Update the .gitignore 2020-07-22 15:24:04 +02:00
Makefile Add make call to rebuild ios exploit when building, block setting a job number higher than 1 2020-07-22 15:16:27 +02:00
README.md Update the README 2020-07-22 15:24:20 +02:00

Standalone payload.elf loader

This is .rpx is meant to run in a envrionment with sd and codegen (jit) access. It's exploits the Cafe OS and maps 8 MiB of usable memory from 0x30000000...0x30800000 (physical address) to 0x00800000... 0x01000000 (virtual address) where a payload will be loaded. You may need to hook into the kernel and patch out some thing to gain persistent access to this area. The loaded payload.elf needs to be mapped to this memory area.

Usage

Put the payload.elf in the sd:/wiiu/ folder of your sd card and start the application. If no payload.elf was found on the sd card, a IOSU exploit will be executed which forces the default title id to the Wii U Menu (in case of system.xml changes)

Building

Make you to have wut installed and use the following command for build:

make

Credits

  • orboditilt
  • Maschell
  • many many more

Parts taken from: