128w ago - Today DanyL has announced at PSX-Scene (linked above) that he has started work on a PS3Payload Downloader project, and although it is currently a WIP he states a release will be incoming as soon as work is completed.
To quote: I'm happy to announce a new project I'm working on, called PS3Payload Downloader.
It's a program that gathers all the payloads for all the platforms (rockbox, teensy, psfreedom and so on) in one place and allow you to download them.
As all my other projects - it's an open source. I'll release the source in github when I'll finish working on it.
Most of the programming is done, what I still need to do it:
• Improve search engine
• Improve GUI - Done
• Create a Logo - Done
• Create an updater - Done
• List and upload all the payloads (Uploaded and listed = 76 payloads)
128w ago - Today Logic-Sunrise.com (linked above) reports that shinhalsafar is developing on a Dolphin-PS3 (GameCube/Wii) WIP Emulator for PS3 JailBreak users.
To quote, roughly translated: "shinhalsafar the original developer of porting fceu (NES emulator) and VBA (Game Boy emulator, Game Boy Color and Game Boy Advance) continues its momentum in the Ports of Nintendo emulators for our greatest pleasure.
In fact he has just created a google code page on his new project, porting dolphin emulator on PS3 and Wii GameCube.
Today Dertyp at PSX-Scene (linked above) reports that KaKaroToKS has dumped the PS3 LV1 syscalls, and plans to update his payload soon to allow other developers to dump the calls.
To quote: For Those Of You Who Are Asking What This Is:
level-1 syscalls are used to call hypervisor functions. On a PS3 the hypervisor is known as as "lv1? (level1) since it is the lowest level that runs directly on top of the hardware. The operating system is executed on top of this and is known as "lv2? (level2).
The two common operating systems are GameOS which PS3 games run on, and OtherOS which is usually used to run linux. Since both OSes run on top of the same lv1 hypervisor, they use the same set of hypercalls which has been partially documented here.
KaKaRoToKS Recent Tweets:
FINALLY able to dump (over eth) all lv1 calls!! Will push it soon!
To everyone misunderstanding: no lv1 access, all I did was be able to dump the "call trace" of lv1 hypercalls. same as payload_dump_syscalls
131w ago - As a follow-up to his PS3 Hypervisor Reverse Engineering Progress report, today graf_chokolo has published on xorloser's blog (linked above) his updated PSGroove payload which now allows for decrypting PKGs from PS3 PUP files.
To quote: "So guys, I promised to you that I will made my PSGroove payload public.
I just uploaded it to github. Let me first explain how it works. I do not have much free time, so please do not expect me to explain every detail to you. The target group of this release are advanced programmers among you. The source code is not commented but it's clean, well structured and self-explaining.
My payload has 2 stages. The 1st stage is actually a PSGroove payload. It initializes the gelic device and allocates memory needed for the 2nd stage. Just compile the 1st stage binary, convert it to C hex array and replace the PSGroove payload.
The 2nd stage does the real job, e.g. decrypts a CORE_OS_PACKAGE.pkg from a PUP file, runs some isolated SPU module or dumps...