Go to file
2020-10-17 00:45:05 +02:00
.github/workflows Add Github action files for CI 2020-08-12 17:23:20 +02:00
source Improve logging 2020-08-23 10:37:31 +02:00
.gitignore Update the .gitignore 2020-07-22 15:24:04 +02:00
Dockerfile Add Github action files for CI 2020-08-12 17:23:20 +02:00
Makefile Rename binary from safe.rpx to root.rpx 2020-10-17 00:45:05 +02:00
README.md Add a Dockerfile 2020-07-22 15:24:30 +02:00

Standalone payload.elf loader

This is .rpx is meant to run in a envrionment with sd and codegen (jit) access. It's exploits the Cafe OS and maps 8 MiB of usable memory from 0x30000000...0x30800000 (physical address) to 0x00800000... 0x01000000 (virtual address) where a payload will be loaded. You may need to hook into the kernel and patch out some thing to gain persistent access to this area. The loaded payload.elf needs to be mapped to this memory area.

Usage

Put the payload.elf in the sd:/wiiu/ folder of your sd card and start the application. If no payload.elf was found on the sd card, a IOSU exploit will be executed which forces the default title id to the Wii U Menu (in case of system.xml changes)

Building

Make you to have wut installed and use the following command for build:

make

Building using the Dockerfile

It's possible to use a docker image for building. This way you don't need anything installed on your host system.

# Build docker image (only needed once)
docker build . -t payloadfromrpx-builder

# make 
docker run -it --rm -v ${PWD}:/project payloadfromrpx-builder make

# make clean
docker run -it --rm -v ${PWD}:/project payloadfromrpx-builder make clean

Credits

  • orboditilt
  • Maschell
  • many many more

Parts taken from: