This month's PS4 PKG Game Dumps continue to expand from DUPLEX since the PS4 Jailbreak 9.00 Exploit release, and following the PS4 9.00 Payloads with GoldHEN v2.0b alongside Sleirsgoevy's Android Script comes a Flask (Web Framework written in Python) PSPack by MC-17 on Github featuring the pOOBs4 PS4 Exploit for v9.0 Firmware complete with automatic GoldenHEN v2.0b2 sending and other minor tweaks detailed below. 

Download: pspack-flask-main.zip / GIT
For those in the PlayStation 4 Scene this comes proceeding the PS4 PKG Sender Docker Compose Web Server UI, Dockerizing Al-Azif's PS4 Exploit Host for LAN and Docker PS4 ELF / OELF / SELF / Test PKG releases and from the README.md: PSPack-Flask
pOOBs4 PS4 exploit for v9.0 + automatic gold hen
About
This is just a repacked psOOBs4, as a flask package with the addition of automatic sending of GoldHEN. Some other small changes:
Setup


Download: pspack-flask-main.zip / GIT
For those in the PlayStation 4 Scene this comes proceeding the PS4 PKG Sender Docker Compose Web Server UI, Dockerizing Al-Azif's PS4 Exploit Host for LAN and Docker PS4 ELF / OELF / SELF / Test PKG releases and from the README.md: PSPack-Flask
pOOBs4 PS4 exploit for v9.0 + automatic gold hen
About
This is just a repacked psOOBs4, as a flask package with the addition of automatic sending of GoldHEN. Some other small changes:
- Some magic numbers have been renamed (never looked at a PS4 bug before, and wanted to know wtf was going on)
- Some additional logging via HTTP requests (not massively useful as can't do a lot in critical section, but useful for kicking off goldenhen send)
Setup
- Download Python and install it, ideally 3.10
- Install flask python3 -m pip install -r requirements.txt
- Run app python3 app.py. Might need to run as root to bind to port 1337
- In the command line the IP address to navigate to will be printed e.g * Running on http://192.168.1.200:1337/ (Press CTRL+C to quit)
- Navigate to port 1337 on that IP on your PS4
- Same as psOOBs4
- GoldHEN should be sent once the server detects success via log messages
- Try again
- If you're not running 9.00, the exploit won't run. You'll need to modify the template to match your version, or just remove the if/endif