Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/SKGleba/0syscall6
A kernel module that patches Playstation Vita's lv0's secure_kernel's syscall 6
https://github.com/SKGleba/0syscall6
Last synced: about 2 months ago
JSON representation
A kernel module that patches Playstation Vita's lv0's secure_kernel's syscall 6
- Host: GitHub
- URL: https://github.com/SKGleba/0syscall6
- Owner: SKGleba
- Created: 2019-11-27T19:40:41.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2020-04-15T08:22:43.000Z (over 4 years ago)
- Last Synced: 2024-11-14T05:34:26.378Z (about 2 months ago)
- Language: C
- Homepage:
- Size: 11.7 KB
- Stars: 200
- Watchers: 12
- Forks: 8
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- Awesome-PlayStation-Vita - 0syscall6 - Remove SELF checks (allows play games on lower firmwares) (⚙️ Basic Stuff / 🔓 Hacking)
README
# 0syscall6
A tool that patches Playstation Vita's lv0's secure_kernel's syscall 6 (SELF/RVK checks)## What does that syscall 6 patch do?
- Removes firmware/sdk version checks from SELFs
- You can i.e play higher firmware games on lower firmwares, assuming that keys didnt change.
- Removes RVK-list checks from SELFs
- You can i.e use the revoked PSM-dev app
- Some other basic SELFs checks are removed## Usage
1) Put the plugin somewhere, preferably in ur0:tai/
2) Add a line to the currently active tai/config.txt (ux0 or, preferably, ur0) under "*KERNEL"
- ur0:tai/0syscall6.skprx
3) Reboot
## Notes
- The checks are removed from SELFs that are passed via syscall 6 as well as SM SELFs
- If the SELF uses new key revisions please use the _renga version with a decrypted kprx_auth_sm (.bin) in ur0:tai/
- psp2renga framework is required
- If you are using the psp2renga framework, please use the _renga version to prevent framework overwrite
- If you are using a hybrid firmware (HFW), please use the _hfw version to prevent wakeup crashes
## Credits
- Team Molecule / xyz for the update_sm 0x50002 exploit and help over discord
- Team Molecule for HenKaku and TaiHen
- TheFlow for dejavu and sysevent RE
- CelesteBlue for help with the resume stuff in early versions