Homebrew Exploits: Difference between revisions

How about if we split them into self-exploitable and secondary exploits? Feel free to revert if found objectionable.
mNo edit summary
Line 4: Line 4:
|-
|-
!  Name
!  Name
!  Supported firms
!  Supported firmares
!  Requirements
!  Requirements
!  Author
!  Author
Line 32: Line 32:
{| class="wikitable" border="1"
{| class="wikitable" border="1"
!  Name
!  Name
!  Supported firms
!  Supported firmwares
!  Requirements
!  Requirements
!  Author
!  Author