DSi exploits: Difference between revisions
| (2 intermediate revisions by the same user not shown) | |||
| Line 90: | Line 90: | ||
| [https://github.com/zoogie/SystemFlaaw Install] | | [https://github.com/zoogie/SystemFlaaw Install] | ||
|} | |} | ||
== DSiWare (True DSi-Mode) Exploits == | == DSiWare (True DSi-Mode) Exploits == | ||
| Line 150: | Line 149: | ||
| @0x1337cafe | | @0x1337cafe | ||
| [https://github.com/nathanfarlow/stylehax Release], [https://farlow.dev/2023/03/02/hacking-the-nintendo-dsi-browser Writeup] | | [https://github.com/nathanfarlow/stylehax Release], [https://farlow.dev/2023/03/02/hacking-the-nintendo-dsi-browser Writeup] | ||
|- | |||
| [[Wrfuxxed]] | |||
| Exploit in a factory test image (WRFU Tester) that communicates with a UART backchannel in a cartridge. Requires a compatible flashcart (currently DSpico only). | |||
| Gericom, XLuma, lifehackerhansol | |||
| [https://github.com/LNH-team/dspico-wrfuxxed Github], [https://github.com/LNH-team/dspico-wrfuxxed/blob/develop/wrfuxxed.md writeup] | |||
|} | |} | ||