source | ||
.gitignore | ||
Makefile | ||
README.md |
Standalone payload.elf loader
This is .rpx is meant to run in a envrionment with sd and codegen (jit) access.
It's exploits the Cafe OS and maps 8 MiB of usable memory from 0x30000000...0x30800000 (physical address) to 0x00800000... 0x01000000 (virtual address) where a payload will be loaded. You may need to hook into the kernel and patch out some thing to gain persistent access to this area.
The loaded payload.elf
needs to be mapped to this memory area.
Usage
Put the payload.elf
in the sd:/wiiu/
folder of your sd card and start the application.
If no payload.elf
was found on the sd card, a IOSU exploit will be executed which forces the default title id
to the Wii U Menu (in case of system.xml
changes)
Building
Make you to have wut installed and use the following command for build:
make
Credits
- orboditilt
- Maschell
- many many more
Parts taken from: