I dont' think gateway work for become his linker compatible with all 3DS et firmware possible and make more money ://
Gateway don't like money :/
It's not about Gateway doesn't like money. It's about Nintendo hates piracy
I dont' think gateway work for become his linker compatible with all 3DS et firmware possible and make more money ://
Gateway don't like money :/
Gatewait.....Doubt it, but they need to step up their game to compete with the CFW's slowly taking over their grounds. I guess time will tell.
Fuck nintendoIt's not about Gateway doesn't like money. It's about Nintendo hates piracy
Slowly? What the hell do those Chinese scammers have that CFW users don't?Doubt it, but they need to step up their game to compete with the CFW's slowly taking over their grounds. I guess time will tell.
SO the question is, who will take on the challenge?Usage with seperate exploits
With php, this repo can be used with the following:
Yellows8 said that there won't be exploits in HIS webhax but he's giving us an opportunity to exploit it our self....wonder where this will lead...
- Include config based on browserhax_cfg_example.php, see that file for details. Include 3dsbrowserhax_common.php.
- Set the global $ROPHEAP variable to an address under the process which the ROP-chain can use for storing arbitrary data(for example, this could be memory where data was sprayed for non-ROP-chain data, since that data isn't needed anymore at this point).
- Call generate_ropchain(). This generates a ROP-chain which can be included in JS via the $ROPCHAIN global variable. To generate a binary-only ROP-chain instead, set the $generatebinrop global variable to value 1 before calling generate_ropchain().
- The ROP-chain data can now be used for generating the final html/js, for example: "var ropchain = unescape($ROPCHAIN);"
- This can be used before the above ROP-chain data, for use as a ROP NOP-sled: "unescape($NOPSLEDROP);"
- This can be used for spraying the stack-pivot gadget address, like for vtable funcptrs: "unescape($STACKPIVOT);"
- This can be used when the exploit requires using the "pop {pc}" gadget: "$somestr.= genu32_unicode($POPPC);"
Kernel Exploit???Since we are modding the 3ds browser WebKit??
**grabs popcorn**SO the question is, who will take on the challenge?
SO the question is, who will take on the challenge?
Ohh yeah**grabs popcorn**
.SO the question is, who will take on the challenge?
Is there?Now there's a legit hype train that will actually bring you somewhere........
Now there's a legit hype train that will actually bring you somewhere........
I don't think so10.0?
I don't think so
10.0 didn't change browser. Also, just read it's supported.I don't think so
--------------------- MERGED ---------------------------
We depend on the browser version
