Go to file
Maschell ebc1203b4a Implement a small proper proc_ui loop to be able to restart the app properly. Wtihout a clean restart unexpected behaviour is possible until the app i switched 2019-11-18 11:38:40 +01:00
source Implement a small proper proc_ui loop to be able to restart the app properly. Wtihout a clean restart unexpected behaviour is possible until the app i switched 2019-11-18 11:38:40 +01:00
.gitignore initial commit 2019-08-15 10:32:25 +02:00
Makefile initial commit 2019-08-15 10:32:25 +02:00
README.md Add a readme 2019-08-18 22:31:10 +02:00

README.md

System Menu Hook

This is a payload that should be run with MochaLite before the System Menu. It's exploits the Cafe OS and maps 8 MiB of usable memory from 0x30000000...0x30800000 (physical address) to 0x00800000... 0x01000000 (virtual address) where a payload will be loaded. The loaded hook_payload.elf needs to be mapped to this memory area.

Usage

Put the root.rpx in the sd:/wiiu/ folder of your sd card and start MochaLite.

This will load another payload from the sd card sd:/wiiu/hook_payload.elf and install it as a main()-hook. An example payload is the Wii U Plugin System Backend.

Building

Make you to have wut installed and use the following command for build:

make install

Credits

orboditilt dimok (gx2 exploit implementation)