Homebrew Exploits: Difference between revisions
Vague Rant (talk | contribs) How about if we split them into self-exploitable and secondary exploits? Feel free to revert if found objectionable. |
Wizardkoer (talk | contribs) mNo edit summary |
||
Line 4: | Line 4: | ||
|- | |- | ||
! Name | ! Name | ||
! Supported | ! Supported firmares | ||
! Requirements | ! Requirements | ||
! Author | ! Author | ||
Line 32: | Line 32: | ||
{| class="wikitable" border="1" | {| class="wikitable" border="1" | ||
! Name | ! Name | ||
! Supported | ! Supported firmwares | ||
! Requirements | ! Requirements | ||
! Author | ! Author |