Now you know, why (among other things) it wasn't public yet!i cant undersand the bmethod to use this exploits
Now you know, why (among other things) it wasn't public yet!i cant undersand the bmethod to use this exploits
i cant undersand the bmethod to use this exploits
http://gbatemp.net/threads/tutorial...server-loadiine-homebrew-launcher-etc.424948/i cant undersand the bmethod to use this exploits
Has the guy in charge of WiiUBru.com been notified about this too?Grab a newer ELF, probably the latest nightly
/payloads/***.bin, /loaders/stagefright.bin, optional /data/boot.elf if you wanna run elfloader to see if the server's working right
Yes he has. The site should be updated.Has the guy in charge of WiiUBru.com been notified about this too?
I don't know if that site has been updated between yesterday or today and I don't remember the user who hosts that page. xD
Awesome, thanks!Yes he has. The site should be updated.
I can only remember his profile pic, and not his name. I'm trying to find his last post.Awesome, thanks!
Would you mind reminding me who he is?
pwsincd I guess is who you meanI can only remember his profile pic, and not his name. I'm trying to find his last post.
Yeah, thats it!pwsincd I guess is who you mean
I really don't understand this, is this the kexploit but closed sourced?Well, I suppose y'all can stop derailing that other thread, yes it is my server setup which I only sent to two people (everyone else only got the exploit binaries, not the server with the rest of the other payloads)
It's just HaxServer with Java 8, from here https://gbatemp.net/threads/beta-wii-u-hax-server.414647/
run it via command line, "java -jar HaxServer.jar", or if your computer has it set up just double click the jar to run it
needs to be able to bind to port 80 which is why I recommend making sure Skype's not open and using command line cause it'll complain
Then find your local IP, "ipconfig", and go to http://<localip>/hax?kexploit31 or kexploit10 if you wanna be arrpirate loadiine me matey
Don't forget to like comment and subscribe
here is the new stable kernal exploit with homebrew launcher 1.2 for 5.4.0 users :
* prepare your local server
* launch web browser
* launch kernel.html first
* it will exit to home menu
* click on web browser again
* launch HBL.html
make sure you have homebrew_launcher.elf in sd:wiiu/apps/homebrew_launcher
success rate is 100%
that will happen becuase they are on the çatest fw and they all think no need to block updates then they get updated on a random day and come back saying my wiiu updated itself lol just wait and see xD.Now that you have the kexploit none of you fuckers better update past 5.5.1 and start whining again that you can't have free games
Well, since it got leaked, I released the source on Github. For those wondering how it works, it's similar to gspwn on the 3DS. The Wii U GPU (the GX2) has direct access to RAM for various operations, and we can send it commands that make it write to RAM. Nintendo attempted to block some addresses from GPU access, but they forgot the PPC kernel heap. So I used a GX2 memory write to redirect the heap into userspace. That way, when a new OSDriver gets created, it gets made in userspace, and I can then just set its save area to the kernel syscall table. From then, it proceeds as the OSDriver exploit did.
shhhh... Don't spoil the fun.Now that you have the kexploit none of you fuckers better update past 5.5.1 and start whining again that you can't have free games