ROP-chain-generator for Wii U PowerPC-userland exploits.
Go to file
yellows8 4a4c13af09 Implemented a loader for loading a payload to fixed-addr codegen+0. 2015-12-04 19:03:57 -05:00
Makefile Implemented a loader for loading a payload to fixed-addr codegen+0. 2015-12-04 19:03:57 -05:00
README.md Initial commit. 2015-11-22 13:08:09 -05:00
wiiu_browserhax_common.php Implemented a loader for loading a payload to fixed-addr codegen+0. 2015-12-04 19:03:57 -05:00
wiiuhaxx_buildropversions.sh Initial commit. 2015-11-22 13:08:09 -05:00
wiiuhaxx_loader.s Implemented a loader for loading a payload to fixed-addr codegen+0. 2015-12-04 19:03:57 -05:00
wiiuhaxx_locaterop.sh This ROP can now successfully load+run a code binary. Added some functionality used for debugging, etc. 2015-12-01 17:58:56 -05:00
wiiuhaxx_locaterop_script This ROP can now successfully load+run a code binary. Added some functionality used for debugging, etc. 2015-12-01 17:58:56 -05:00
wiiuhaxx_rop_sysver_532.php This ROP can now successfully load+run a code binary. Added some functionality used for debugging, etc. 2015-12-01 17:58:56 -05:00
wiiuhaxx_rop_sysver_550.php This ROP can now successfully load+run a code binary. Added some functionality used for debugging, etc. 2015-12-01 17:58:56 -05:00

README.md

This is a common codebase for generating ROP-chains/etc for Wii U exploits. This uses addresses auto-located from coreinit. Currently only binary ROP-chains are supported.

You must specify the "sysver={val}" URL parameter for pages using this codebase, for selecting your Wii U system-version:

  • "532": 5.3.2
  • "550": 5.5.0