DSi exploits: Difference between revisions
| (One intermediate revision by the same user not shown) | |||
| Line 89: | Line 89: | ||
| zoogie | | zoogie | ||
| [https://github.com/zoogie/SystemFlaaw Install] | | [https://github.com/zoogie/SystemFlaaw Install] | ||
|} | |} | ||
| Line 154: | Line 149: | ||
| @0x1337cafe | | @0x1337cafe | ||
| [https://github.com/nathanfarlow/stylehax Release], [https://farlow.dev/2023/03/02/hacking-the-nintendo-dsi-browser Writeup] | | [https://github.com/nathanfarlow/stylehax Release], [https://farlow.dev/2023/03/02/hacking-the-nintendo-dsi-browser Writeup] | ||
|- | |||
| [[Wrfuxxed]] | |||
| Exploit in a factory test image (WRFU Tester) that communicates with a UART backchannel in a cartridge. Requires a compatible flashcart (currently DSpico only). | |||
| Gericom, XLuma, lifehackerhansol | |||
| [https://github.com/LNH-team/dspico-wrfuxxed Github], [https://github.com/LNH-team/dspico-wrfuxxed/blob/develop/wrfuxxed.md writeup] | |||
|} | |} | ||