To quote: A 'rebooter', allows to 'reboot' the 360 into an MS kernel after starting it with the JTAG Hack... in this case (freeBOOT v0.01) it should reboot the console into MS kernel 8498 (but I assume 8507 will be possible too, and it's probably also the first step into rebooting into patched/modified MS kernels).
The readme says it requires the Cygnos360 v2 chip atm, I'm assuming they need it to automatically reset the SMC back to original.
Booting your 360 into 849x+ and keeping the JTAG Hack working was impossible until now, because updating to 849x+ via the MS update procedures burned a CB-fuse which made it impossible to still perform the JTAG Hack.
If you already updated your console to 849x+ via normal update methods there is still no solution for you, but if you have a JTAG 'hackable' console (kernel 7371 or lower on NAND) freeBOOT should allow you to 're boot' it into 8498 via the JTAG Hack.
To quote: As a first step toward a "release", I've committed the tool to build an image suitable for the hack, as well as some additional information and a description of "how it works".
I understand that not all of the required binaries are available right now, but we'll work on provider ways to derive them from nand dumps. But those of you who are able to recover the required binaries should be able to build an image which boots right into xell.
There are 3 things that we have to take care about:
• The 1920+ CB/CD. If somebody has a 1920 box, just do the timing attack, extract your cpu key, add that cpukey into "decrypt_CD", and use that image. You'll get the decrypted CB/CD in your "output"-directory. I'll then describe how to build the 1921 and the other CDs from that.
• the hacked SMC for kicking off the read. You basically need to add writing to the nand command...