Go to file
2020-07-22 15:16:27 +02:00
source format code 2020-07-22 15:12:25 +02:00
.gitignore First commit 2020-04-26 13:41:39 +02:00
Makefile Add make call to rebuild ios exploit when building, block setting a job number higher than 1 2020-07-22 15:16:27 +02:00
README.md Update the Readme and remove some DEBUG printfs 2020-04-26 13:45:12 +02:00

Standalone payload.elf loader

This is .rpx is meant to run in a envrionment with sd and codegen (jit) access. It's exploits the Cafe OS and maps 8 MiB of usable memory from 0x30000000...0x30800000 (physical address) to 0x00800000... 0x01000000 (virtual address) where a payload will be loaded. You may need to hook into the kernel and patch out some thing to gain persistent access to this area. The loaded hook_payload.elf needs to be mapped to this memory area.

Usage

Put the payload.elf in the sd:/wiiu/ folder of your sd card and start the application. If no payload.elf was found on the sd card, a IOSU exploit will be executed which forces the default title id to the Wii U Menu (in case of system.xml changes)

Building

Make you to have wut installed and use the following command for build:

make

If you change any IOSU related changes, you need to do a make clean before compiling

Credits

  • orboditilt
  • Maschell
  • many many more

Parts taken from: