Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.
PS4 Jailbreaking       Thread starter stooged       Start date May 29, 2018 at 1:58 AM       302      
Status
Not open for further replies.
This is an update to my Android app to host the PS4 5.0X exploit and payloads.

This initial release just contains the 3 main payloads.

To use it you have to setup a wifi hotspot with your phone/tablet and connect the PS4 to that hotspot or connect the phone/tablet to the same network the PS4 is on.

Then install the app and open it and at the top will be the address you need to connect to with the PS4.

Your device might ask you about installing an application from "unknown sources" this is ok to allow, it just means its not coming from Google Play.

You just select the payload you want to run in the app and then use the PS4 to goto the address that you see in the app.

To change the payload just select it in the app and then use the ps4 to revisit/refresh the address again.

you can add more payloads to the app you just plug your phone into your computer and copy any payload BIN file you like into the PS4_50X_Payloads directory.

you will get one "There is not enough free system memory" because that's how this exploit works, just click ok and the page should reload and load the selected payload.

Download:

ps4_serve3_v2_3.zip / GIT

Spoiler: Depreciated

Eye candy:
Android App to Host PS4 5.05 Exploit and Payloads by Stooged.jpg


Install GTA 5 mod menu 5.05 PS4 with android app, wildemodz
 

Comments

@Koh23

you can add your own payloads.

I don't know where the repo for "mira hen" is.

the 5.05 exploit that was released would launch xvortex hen then it would launch mirafw orbis but I have not yet seen a "mira hen" payload or repo.

you could replicate the same thing by loading xvortex hen 1.6 and then loading mirafw orbis.
 
I have slim 2116a on 5.05 it shuts down sometimes when using xvortex hen 1.6 using this app.

I was having trouble with launching games installed using Mira. Here is my workaround

Copy pkg back using ftp

User/app/CUSAXXXXX/app.pkg

Rename app.pkg to whatever put it in the USB and install the pkg again while using xvortex hen.

I get upto 50 mbps speed using ftp so fairly easy
 
@stooged

Well i'm not sure what i have, but it's called "mirahen", enable debug settings and runs backups. Also not sure if i'm allowed to say from where i got it, it's a collection i was using when we were on 4.xx, a member here recommend me that, so i assume it's ok to mention this here....

It's Kiwi 5.05 self host index 1.5, so you maybe can check out...

Apologies if this break any rules
 
You can use KWS server (which I use) to run different index.htmls exploits (mira, etc...)
you need to setup HOME dir which will contain that index page.

By default it will assign as the same IP:8080 as the stooged app assigns (it's actually wi-fi hot stop selects that IP) so you can use the same bookmark in the browser to use both apps
 
@Koh23

Looking at the kiiwii 1.5 inside the mira folder all you find is the original 5.05 exploit

If you look inside the userland.js you will see this

Code:
// Load HEN-VTX
      if (buffer == '926100000') {
        writeHomebrewEN(p, code_addr.add32(0x100000));
      }

      // Launch HEN-VTX
      p.fcall(code_addr);

      // Zero
      for(var i = 0; i < 0x300000; i += 8)
      {
        p.write8(code_addr.add32(i), 0);
      }

      // Load Mira
      if (buffer == '926100000') {
        writeMira(p, code_addr.add32(0x100000));
      }

      // Launch Mira
      p.fcall(code_addr);

So what they are calling mirahen is just loading xvortex hen and then loading the mirafw orbis which is what i mentioned before and you can replicate that by loading xvortex hen and then the mirafw orbis payloads using any of the available exploit loaders.

It seems there is a bit of confusion going around about "mirahen" because as far as i know the mirafw orbis project does not allow fakepkg/backups its the xvortex hen thats being loaded first enabling it.

So really it should be called "vortex-hen + mirafw"

Check your version of "mirahen" and if its all the exploit files like index.html, mira.js, homebrew.js, userland.js etc..
Then go into userland.js to about line 430 and look to see if its like the code i posted above and if it is then your "mirahen" is really "xvortex-hen + mirafw orbis"
 
Probaby it is, like i said, not sure what i have...

Ok, is there a vay to do it in your aplication without sending 2 payloads, one click solution?
 
No 1 click option but there is no problem loading xvortex hen and then select mira in app and reload webpage on ps4
 
Status
Not open for further replies.
Back
Top