|
4 months ago | |
---|---|---|
diibugger | 8 months ago | |
miniloader | 8 months ago | |
payload | 8 months ago | |
tools | 8 months ago | |
README.md | 4 months ago | |
a.out | 8 months ago | |
code550.bin | 8 months ago | |
codebin2js.py | 8 months ago | |
codebin2js_DEV.py | 8 months ago | |
diibugger.mp4 | 8 months ago | |
illuminati.mp4 | 8 months ago | |
index.html | 4 months ago | |
payload.js | 8 months ago | |
post-merge.example | 8 months ago | |
ropChainToAsm.py | 8 months ago | |
startDiibugger.bat | 8 months ago | |
startServer.bat | 8 months ago | |
tcpgecko.mp4 | 8 months ago | |
wiiuhaxx_loader.bin | 8 months ago |
This is the git repository for stUpiidhax, a very popular homebrew entrypoint access gate for the Wii U's 5.5.2 firmware.
This is based on the JumpCallPop JSTypeHax (aka WiiUTest) exploit. Unfortunately, JumpCallPop's GitHub account was removed, leaving this repo.
The latest changes to upstream are available in this repo under the
fast
branch. While these changes do make the exploit much faster, they
also make it far less reliable. The most reliable version of the exploit
available is on the stable
branch, which is also the version actively
hosted on my servers.
Both the stable
and fast
branches have changes to make them
compatible with SSI, or Server Side Includes, an Nginx feature that
allows the server to generate certain parts of pages without requiring
PHP or something similar. A version of stable
with the SSI
requirements removed is available under the nossi
branch.
The so-called cg
method was used to improve reliability with some
older versions of the exploit. I no longer believe that this is
nesessary as the current stable
exploit is quite reliable, but I
figure it's worth documenting anyway.
With an old version of the exploit, it seemed more effective than placebo to run the access gate behind a very specific server configuration. We accidentally discovered that it seemed to help if the access gate was specifically hosted on GitHub Pages, but proxied behind Cloudflare's POPs. We tried Cloudflare's POPs in front of a normal server as well as GitHub Pages without Cloudflare's POPs, all to no avail. It seems something specific about running the gate on GitHub Pages and putting Cloudflare's DDOS protection service in front of it would cause the exploit to become more reliable.
Once again, I no longer believe this is nessesary or even useful with
the current stable
version, but I still believe that it's worth
noting.
The cg method was accidentally discovered by Creation_ and researched extensively by myself.
Self-hosting the exploit can help improve the reliability if you have a
slow internet connection. You can checkout the nossi
branch of this
repo and host it with any old webserver, or you can checkout the
stable
branch and host it with Nginx, assuming SSI is enabled (simply
put ssi on;
in the config file). More detailed instructions for
self-hosting may be posted soon.
Once again, all credit for the exploit itself goes to JumpCallPop and everyone else who helped him get this working. I just made a nice gateway, helped lots of people get it working, and compiled all this information.