I know but i was searching for USB_ioctl_15, sorry i misspelled x)0x1012EB64 is the right address for syscall 0x15 via IOS-USB.
I know but i was searching for USB_ioctl_15, sorry i misspelled x)0x1012EB64 is the right address for syscall 0x15 via IOS-USB.
can i have iosuI know but i was searching for USB_ioctl_15, sorry i misspelled x)
You already have it from that thread -_-can i have iosu
-.-.-.-.-.-.-___You already have it from that thread -_-
You already have it from that thread -_-
Can you please upload the mp4 version of the OTP via IOSU?Why do you want the .elf then? Is it just so it matches with your collection of other elf files?
I don't think an MP4 version of the OTP retriever would be possible. Libwiiu does not have (most of?) the neccessary library/include files for it. Only ELF (and possibly RPX soon?) are the only possible means of being able to boot the example for now.Can you please upload the mp4 version of the OTP via IOSU?
ok, but is there a way to do this without an SD card because my SD card slot is messed up?I don't think an MP4 version of the OTP retriever would be possible. Libwiiu does not have (most of?) the neccessary library/include files for it. Only ELF (and possibly RPX soon?) are the only possible means of being able to boot the example for now.
why do u even need to know your OTP at the moment ? it's literally useless.ok, but is there a way to do this without an SD card because my SD card slot is messed up?
I don't, I just wanna try it somehow.why do u even need to know your OTP at the moment ? it's literally useless.
Then you should really send your Wiiu to repair , The Sd card is going to be the most important factor when a CFW is released.I don't, I just wanna try it somehow.
My micro-SD to SD card converter broke inside of my Wii U. Do you think i could try to get the piece with something, and if so what?Then you should really send your Wiiu to repair , The Sd card is going to be the most important factor when a CFW is released.
There you go: https://drive.google.com/open?id=0B6pkRCU5qlTqR28tZXI1d2kwcUkCan you please upload the mp4 version of the OTP via IOSU?
do i have to run kexploit first?There you go: https://drive.google.com/open?id=0B6pkRCU5qlTqR28tZXI1d2kwcUk
It uses https://github.com/rw-r-r-0644/HBAS-Portable that can download any hbl elf file in ram and launch it (mostly a LoadiineGX2 sd_loader ripoff)
PS: Launch rate is loaw due to binary size
does the advent of this have anything to do with boot0 or boot1? like that last thing people were talking about, but it's exceptionally brick-risky to screw with? Or with messing with boot0, boot1 require another exploit? Are the OTP keys necessary to decrypt / encrypt a NAND back up to do CFW stuff to it? Such as dump > use keys to decrypt > patch > re-encrypt?
have no idea, but i advice you not to mess with it and send it to Nintendo , or someone who has knowledge in repairing stuff.My micro-SD to SD card converter broke inside of my Wii U. Do you think i could try to get the piece with something, and if so what?
I have uploaded it to ourbrew.ml/code550.mp4 if this not unpalatable for youThere you go: https://drive.google.com/open?id=0B6pkRCU5qlTqR28tZXI1d2kwcUk
It uses https://github.com/rw-r-r-0644/HBAS-Portable that can download any hbl elf file in ram and launch it (mostly a LoadiineGX2 sd_loader ripoff)
PS: Launch rate is loaw due to binary size
I don't think Nintendo would repair that. They only repair liquid damage and physical damage.I really
have no idea, but i advise you not to mess with it and send it to Nintendo , or someone who has knowledge in repairing stuff.