ROP-chain-generator for Wii U PowerPC-userland exploits.
Go to file
2015-12-01 17:58:56 -05:00
README.md Initial commit. 2015-11-22 13:08:09 -05:00
wiiu_browserhax_common.php This ROP can now successfully load+run a code binary. Added some functionality used for debugging, etc. 2015-12-01 17:58:56 -05:00
wiiuhaxx_buildropversions.sh Initial commit. 2015-11-22 13:08:09 -05:00
wiiuhaxx_locaterop_script This ROP can now successfully load+run a code binary. Added some functionality used for debugging, etc. 2015-12-01 17:58:56 -05:00
wiiuhaxx_locaterop.sh This ROP can now successfully load+run a code binary. Added some functionality used for debugging, etc. 2015-12-01 17:58:56 -05:00
wiiuhaxx_rop_sysver_532.php This ROP can now successfully load+run a code binary. Added some functionality used for debugging, etc. 2015-12-01 17:58:56 -05:00
wiiuhaxx_rop_sysver_550.php This ROP can now successfully load+run a code binary. Added some functionality used for debugging, etc. 2015-12-01 17:58:56 -05:00

This is a common codebase for generating ROP-chains/etc for Wii U exploits. This uses addresses auto-located from coreinit. Currently only binary ROP-chains are supported.

You must specify the "sysver={val}" URL parameter for pages using this codebase, for selecting your Wii U system-version:

  • "532": 5.3.2
  • "550": 5.5.0