Homebrew Exploits: Difference between revisions
No edit summary |
ugh |
||
Line 16: | Line 16: | ||
==Standalone Homebrew Launcher Exploits== | ==Standalone Homebrew Launcher Exploits== | ||
The following homebrew exploits can be executed on a previously un-exploited system. | The following homebrew exploits can be executed on a previously un-exploited system. ''Please'' see the above Payload section regarding what "Supported firmwares" indicates ''exactly''. | ||
{| class="wikitable" border="1" | {| class="wikitable" border="1" | ||
Line 81: | Line 81: | ||
==Secondary Exploits== | ==Secondary Exploits== | ||
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. | Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. ''Please'' see the above Payload section regarding what "Supported firmwares" indicates ''exactly''. | ||
{| class="wikitable" border="1" | {| class="wikitable" border="1" |