@Goku Junior
First error fix:
First error fix:
second error fix:Mini tutorial:
I admit, the tutorial for powerpc-eabi-gcc isn't straight forward, like the python one, so:
Code:echo "PATH=\$PATH:/cygdrive/c/devkitPro/devkitPPC/bin" >> .bash_profile source .bash_profile which powerpc-eabi-gcc
Also, Windows Defender will say that the payload[*].html files are malicious... Don't worry about it.
Edit:
Oh, and than test it with, for example:
"python build.py osscreenexamples/template"
Didn't work.
But uhmm.. Just tried making a .bat solution. Just wrote
into the .bat and let it running. No error message.Code:python build.py examples\helloworld pause
Now I have the following inside of www\helloword
View attachment 20846
Is this all right?
I will do a test run, now
EDIT: It froze the image but did not write any text on the screen (if this exploit was supposed to do so).