To breach the unbreachable!
選択できるのは25トピックまでです。 トピックは、先頭が英数字で、英数字とダッシュ('-')を使用した35文字以内のものにしてください。
ManicSec a39feb11a5 Default 2年前
public Default 2年前
.gitignore Default 2年前
README.md Default 2年前
gulpfile.js Default 2年前
main.js Default 2年前
package.json Default 2年前

README.md

PS4Breacher

To breach the unbreachable!

Setup Requirements

1) git
2) nodejs & npm
3) gulp
4) root or a sudoer user

Setup Instructions

1) git clone https://git.teknik.io/Monstro/PS4Breacher.git && cd PS4Breacher
2) npm install
3) gulp production
4) sudo npm start (if not already root, uses port 80)

Web UI Preview

https://i.imgur.com/5Elccz5.jpg

https://jsfiddle.net/nr61aL6q/20/

Output in nodejs console

> PS4Breacher@1.0.0 start /home/x2f/Desktop/PS4Breacher
> node main.js

Server listening on port 80
[1]: Starting System.
[2]: Starting Userland Breach.
[3]: The next stage could take a while...
[4]: Starting in 5 seconds, don't worry, 
[5]: - The page won't be frozen, but may look like it!
[6]: Found data @ element #18
[7]: data=["0x7473","0x10000","0x8c869b0","0x2","0x8c211c0","0x2","0x8c21180","0x2","0x7473","0x10000","0x8c869b0","0x2"]
[8]: Successfully exploited WebKit!
[9]: Now we can load the ExploitCore
[10]: Beginning GC force
[11]: GC should be solid
[12]: leakFunc ========= 0x0000000200499180
[13]: funcPointer ====== 0x00000008329b8540
[14]: libSceWebKit2 ==== 0x0000000832440000
[15]: libkernel ======== 0x00000008323b8000
[16]: ExploitCore is now loaded!