https://github.com/davidbuchanan314/nxloader
My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)
https://github.com/davidbuchanan314/nxloader
cve-2018-6242 exploit nintendo nintendo-switch nintendo-switch-hacking usb
Last synced: 2 months ago
JSON representation
My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)
- Host: GitHub
- URL: https://github.com/davidbuchanan314/nxloader
- Owner: DavidBuchanan314
- License: mit
- Created: 2018-04-28T11:50:00.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2022-12-11T10:44:39.000Z (about 3 years ago)
- Last Synced: 2025-03-27T18:55:55.547Z (9 months ago)
- Topics: cve-2018-6242, exploit, nintendo, nintendo-switch, nintendo-switch-hacking, usb
- Language: Java
- Homepage: https://nxloader.app
- Size: 303 KB
- Stars: 530
- Watchers: 54
- Forks: 53
- Open Issues: 15
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README

# NXLoader
My first Android app: Launch Fusée Gelée payloads from stock Android
Heavily based on [Fusée Gelée](https://github.com/reswitched/fusee-launcher/) and [ShofEL2](https://github.com/fail0verflow/shofel2). [fusee.bin](https://github.com/ktemkin/Atmosphere/tree/poc_nvidia/fusee) is bundled as a default payload
## Note: Any proprietary payloads are neither tested nor supported by this software.
## Does it work on your device? [Report here](https://github.com/DavidBuchanan314/NXLoader/issues/1)
## [Get the APK release](https://github.com/DavidBuchanan314/NXLoader/releases)
This app is currently in "Alpha" state, it's my first Android app and there
is some rather disgusting code (Potentially blocking tasks on the UI thread 🤢). This will be improved soon™.
## HOWTO:
- Launch the app.
- (Optional) go to the Config tab, and select a custom payload file.
- Plug in your Switch. (On my Nexus 5, I use a micro USB OTG cable, and an A-to-C cable)
- Put it into RCM mode. (Note: your switch will power on by itself when plugged in, be sure to hold VOL+).
- Grant permission to the app to access the USB device.
- Enjoy!
Note: The app does not need to be running in order to launch the payload. The phone can even be locked!
## FAQ:
- Why use this over a web-based launcher?: No internet required, and can auto-launch even if your phone is locked. Plug and play!
- Can it load Linux?: soon™
- Will it brick my phone/switch?: Hopefully not, but I an certainly not responsible if it does!
- Does it need root?: Nope!
## TODO:
- Refactor the code so it's less hacky
- Improve UI/UX
- Implement loader for fail0verflow's Linux
For anyone who wants to look at the exploit source, the magic happens [here](https://github.com/DavidBuchanan314/NXLoader/blob/master/app/src/main/java/io/github/davidbuchanan314/nxloader/PrimaryLoader.java).