Homebrew Exploits: Difference between revisions
No edit summary |
remove aids |
||
Line 1: | Line 1: | ||
==Standalone Homebrew Launcher Exploits== | ==Standalone Homebrew Launcher Exploits== | ||
The following homebrew exploits can be executed on a previously un-exploited system. | The following homebrew exploits can be executed on a previously un-exploited system. | ||
{| class="wikitable" border="1" | {| class="wikitable" border="1" | ||
Line 50: | Line 48: | ||
==Secondary Exploits== | ==Secondary Exploits== | ||
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. | Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. | ||
{| class="wikitable" border="1" | {| class="wikitable" border="1" | ||
Line 160: | Line 157: | ||
! Author | ! Author | ||
|- | |- | ||
| | | Yes, that's not the intended default use however. | ||
| [https://github.com/yellows8/ctr-httpwn/releases ctr-httpwn] | | [https://github.com/yellows8/ctr-httpwn/releases ctr-httpwn] | ||
| From '''9.6.0-X''' up to and including '''10.7.0-X''', for '''X''' up to and including 32. | | From '''9.6.0-X''' up to and including '''10.7.0-X''', for '''X''' up to and including 32. |