89w ago - Following up on the previous releases, this weekend PlayStation 3 developer ps3hen has made available XMBM+ PKG Compiler Toolkit - a PS3 Package builder and distributer homebrew application for Windows users.
To quote: After recent efforts to "extract our work back to source" and realising how annoying it is to individually re-package of the now large collection a packages which comprises 'a release' for the XMBM+. I bring the XMBM+ Package Compiler Toolkit.
After a day of re-learning batch with my tutor google, I've finished the tool which anyone working on the XMBM+ can use to make mastering/testing much easier. The basics of what it does:
1/ Compile, rename and post to dropbox (requires access to dropbox account)
2/ Compile rename and send to a specified directory on computer
3/ Cool little other features
Anyway to save time modifying important the directories, I've taken the liberty of making them variables existing in the settings.ini. Modifying the settings.ini is necessary...
To quote: After using the XorHack for a while I realised it was missing some things so I decided it was time for an update. New syscalls have been added to give finer control over data access, now providing 8, 16, 32 and 64 bit reads and writes.
Also some new ioctls were added to provide additional useful functions for your userland code. Lastly new userland applications were added which now give the ability to read, write and execute memory from the command line.
Hypervisor Exploit Changes
At the innermost level some more syscalls are now added to the hypervisor when initially exploiting the PS3. These use different syscall numbers to the previous exploit code in order to group them all together rather than scattering them all over the place.
This should make keeping track of them easier. There are now nine syscalls added to the PS3 upon exploiting. These are added as syscalls 32 to 40 inclusive. Previously syscalls 16 and 20 were used...
196w ago - Today xorloser has shared his XorHack: The PS3 Exploit Toolkit which allows you to call lv1 syscalls (level 1 system calls) from a normal (userspace) program and run the software required when triggering the PS3 exploit from a normal userspace program.
To quote: I finally found the time to complete the PS3 exploit toolkit software I mentioned to in my previous posts. I call it XorHack.
It allows you to call lv1 syscalls (level 1 system calls) from a normal (userspace) program. It also lets you run the software required when triggering the PS3 exploit from a normal userspace program. To give an example of how it can be used I have included the following example programs:
ps3exploit - Runs the software required to exploit the ps3, it loops a number of times which can be specified as a parameter. (This still must be used along with the "button pressing", it will not exploit the PS3 via software alone).
dumphv - Dumps the hypervisor to a file in the current directory.
dumpbl - Dumps the bootloader to a file in the current directory.
dumprom - Dumps the system rom to a file in the current directory.