README.txt

(5 KB) Pobierz
2.84g
------

- Since it seems differents commits of the exploit code works differently for different consoles, i added a exploit selection screen, so you can try them all and choose the one that runs better in your console. The exploit selection screen will be show first time you open the guide, and everytime you delete site data. Whatever option you choose will be used for every payload in the host.

From newer to older: Alt2 > Alt1 > No labeling

I've been getting 100% success rate with Alt2 (newer code, makes sense, but was getting 0% before), and no labled version which used to give me near 100% success rate has now lowered to around 30% or so. Seems any minimal change of stuff on exploit loading screen affects it a lot! So i guess this is the best way for you to try different options.

Next to each option you will find the sha string for that commit, so you can look up the diffs on sleirsgoevy's github.

That's it for now. Unless something new and very important stuff comes out, this is it for the ESP until i get the online and RPi hosts and manuals up to date with this release.

Feel free to share you best config including console model + exploit code used on twitter and report any bug.


2.84f
------

- Bug fix to deal with spoofed FW version, forgot to add it for 6.72. You need to allow cookies in browser or this won't work.


2.84e
------

- About the exploit options:

For some consoles (like mine) 1st exploit code commit from Aug. 3rd WORKS almost 100%, but fails for others.
For some consoles (like mine) 3rd exploit code commit from Aug. 3rd FAILS 100%, but works for others.

a) Mira (Unoff) -> Mira Unoffical + sleirsgoevy's exploit code (1st commit from Aug. 3rd). Same as 2.84d
b) HEN alt-xpl -> SiSTR0's HEN 2.1.3 + sleirsgoevy's latest exploit code (3rd commit from Aug. 3rd)
c) HEN 2.1.3 -> SiSTR0's HEN 2.1.3 + sleirsgoevy's exploit code (1st commit from Aug. 3rd)

I didn't add Mira (Unoff.) + 1st commit cause aparently HEN 2.1.3 works better after the exploit had been loaded.

- Added @notzecoxao ToDEX payload

- After installing offline host it's recommended to reboot.


2.84d
------

- Removed older exploit + mira tests and added latest exploit code (Aug. 5th 1st update, there has been 2 more updates, but they seem not so stable). I got 1 KP out of 20 tries (PS4 Slim 1TB here). If you get KP, report on twitter with your console model, and how it happened.

- Added Enable Updates, Disable Updates (not needed but some requested them and there is free space in the ESP now), Bin Loader and PS4 Trainer payloads. However, PS4 trainer app doesn't seem to find the console, i need to check network traffic and see what's going on, maybe the ESP code is filtering traffic or something.

- Send payload button always disabled, now fixed in mobile/PC tools.


2.84c
------

- Fixed all Stooged payloads in online mode, somehow i forgot to reference the 6.72 files, my bad! :( Offline it was done correctly.

- Removed v4, left v3 (which is just the previous version of the exploit and worked great), and v5 (which is the latest version of the exploit and *should* be more stable, but it isn't at all in my case). Again, note this v3, v4, v5 labeling is my own! Don't go bugging AlAzif or sleirsgoevy with "this or that fails on vX", they probably won't even know what you are talking about. Both v3 and v5 now uses latest Mira (unofficial) which works great.

- MY RECOMMENDATION - Install offline mode, and use v3, and if it crashes a lot for you, use v5. Both uses Mira (Unofficial) so you will the same features with any of them. v3 barely crashes in my case while v5 might work great 20 times, then crash once, and next 20 times will keep crashing :\

- You may get "Out of memory" errors randomly, just click ok, and let the guide reload.

- I WON'T REPLY TO STUFF LIKE : "v4 worked better, please add it again" -> No, v4 is now v5 with the new mira (unofficial). Remember the exploit is not that stable, and will randomly crash sooner or later.

- DO NOT SHUT DOWN THE PS4, it will likely crash. I't better to reboot, then do a clean shut down without the exploit loaded.

- Don't forget to WIPE ALL DATA when flashing the ESP8266.

- Added HEN 2.1.4 to 5.05 payloads (untested, not in 5.05 anymore).
- 4.55 stuff is back


2.84b
------

- Added latest explit update (July 24th)
- Added DB-SG backup, DB Restore and App2USB. also the Custom exploit menu (read the manual for this).
- Fixed a file which could cause some problems with the cache (but shouldn't!).
- Removed 4.55 related stuff for now. 

2.84a
------

- Online mode works well too, but it takes a while to load, might take up to 3 minutes to run the exploit. DO NOT close the browser until you get the "JB failed" or "JB done" messages. Seems frozen, but it is not, just BE PATIENT.

- Offline mode is really fast! I recommend restarting the console after installing the host for offline browsing, i need to take a look at the code again, i get out of memory errors if i run the exploit right after installing the offline mode. Restarting might save you a KP.

- Console goes a little slow after the exploit and payload have been loaded. Exit the browser and give it a break, should get back in a few seconds.

- Dumper and FTP loads fine, so should work. Didn't test them tho, it's too late.

- Will add more stuff during the weekend.
Zgłoś jeśli naruszono regulamin