Proceeding the pOOBs4 9.00 PS4 Jailbreak Exploit, PS4PiZero / PS4RaspberryPi Project, pOOBs4 Buildroot PS4 9.00 Exploit Web Server / USB Emulation and PS5 Server Pico Project for Raspberry Pi Pico W comes PS4JBEmu which is a PS4 Jailbreak Local Host and USB Emulator for clean Raspberry Pi OS. 
Download: PS4JbEmu-2GB.7z (430 MB) / GIT
Here's more details from the README.md: PS4JbEmu
Local PS4 Jailbreak Host with USB emulation
This project is aimed at setting up a local web host, with USB emulation, on select Raspberry Pi boards that can be used to exploit and jailbreak PS4 consoles running firmware version 9.00. Raspberry Pi Zero W / Pi Zero 2 W / Pi4 B are eligible boards as they support a USB on-the-go (OTG) gadget mode and eliminate the need to manually insert and remove the USB stick required in the exploit process.
This project is implemented on a clean Raspberry Pi OS (Debian) install which makes it easier to repurpose the Pi to run additional applications and services on it.
Developed and Tested on Raspberry Pi 4 B but should work on Pi Zero W / Pi Zero 2 W / Pi4 B
Benefits
Credits
Download: PS4JbEmu-2GB.7z (430 MB) / GIT
Here's more details from the README.md: PS4JbEmu
Local PS4 Jailbreak Host with USB emulation
This project is aimed at setting up a local web host, with USB emulation, on select Raspberry Pi boards that can be used to exploit and jailbreak PS4 consoles running firmware version 9.00. Raspberry Pi Zero W / Pi Zero 2 W / Pi4 B are eligible boards as they support a USB on-the-go (OTG) gadget mode and eliminate the need to manually insert and remove the USB stick required in the exploit process.
This project is implemented on a clean Raspberry Pi OS (Debian) install which makes it easier to repurpose the Pi to run additional applications and services on it.
Developed and Tested on Raspberry Pi 4 B but should work on Pi Zero W / Pi Zero 2 W / Pi4 B
Benefits
- Clean Raspberry Pi OS install - easy to setup the Pi for other purposes as you desire
- Easily update exploit, GoldHen and payload files from the web interface
- One device for local web server and USB emulation
- One USB cable is sufficient to power the Pi and emulate USB
- You can leave the Pi permanently connected to the PS4. No need not to remove and plug in a USB stick to run exploit
- Write the image provided in the releases to an SD card (using program like Pi Imager or Rufus)
- Insert the SD card into the Raspberry Pi
- For Pi Zero W & Pi Zero 2W, connect the USB marked Pi USB port to PS4. Be sure to use a cable that supports data transfer:
- For Pi4 B, connect a USB C cable from Pi to PS4
- Power up the PS4. This should also boot up your Pi
- Use raspi-config to expand the filesystem to the capacity of your SD card
- On the PS4 go to Browser and visit http://ip.address.of.your.pi
- Click on the GoldHen button for the version you want to exploit with
a. A popup will be thrown saying USB emulation started and wait for ps4 pop up:
b. Once the USB message disappears, Click ok
c. Gold Hen will load automatically - If you need SSH access, username is pi and password is ps4jb
- Install a clean Raspberry Pi OS image to an SD card (Developed and tested on Debian Bullseye)
- Enable USB Gadget Mode on the Pi
a. Add dtoverlay=dwc2,dr_mode=peripheral to the [all] section inside /boot/config.txt - Install and setup lighttpd and PHP
- Configure /var/www/html/ps4 as the document root directory for the exploit app
- Clone or download the source code from this repo
a. Copy all files to /var/www/html/ps4
b. For /var/www/html/ps4 and all it's contents make www-data:www-data the owner and change permissions to 755 - Set sudo /sbin/modprobe -r g_mass_storage to run at every boot via crontab or /etc/rc.local
- Allow the webserver user to run some commands as root without password
a. Add www-data ALL = NOPASSWD: /sbin/modprobe, /sbin/reboot, /sbin/shutdown to your sudoers file using visudo
Credits
- Sleirsgoevy – Webkit, Offline Activator
- Chendochap – KeExploit
- Karo Sharifi – Offline Exploit Web Host
- PaulJenkin – Inspiration for USB Emulation