Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/fedebuonco/yapppwn
YAPPPWN is a Rust rewrite of the PPPWN Exploit by TheOfficialFloW.
https://github.com/fedebuonco/yapppwn
exploit explotation homebrew jailbreak playstation pnet ps4 ps4exploit rust
Last synced: about 2 months ago
JSON representation
YAPPPWN is a Rust rewrite of the PPPWN Exploit by TheOfficialFloW.
- Host: GitHub
- URL: https://github.com/fedebuonco/yapppwn
- Owner: fedebuonco
- License: mit
- Created: 2024-05-20T23:29:53.000Z (9 months ago)
- Default Branch: master
- Last Pushed: 2024-10-28T21:42:42.000Z (3 months ago)
- Last Synced: 2024-10-28T22:31:15.689Z (3 months ago)
- Topics: exploit, explotation, homebrew, jailbreak, playstation, pnet, ps4, ps4exploit, rust
- Language: Rust
- Homepage:
- Size: 415 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# YAPPPWN
A Rust rewrite of the PPPwn exploit - PlayStation 4 PPPoE RCE by TheOfficialFloW [here](https://github.com/TheOfficialFloW/PPPwn)
This project was created for fun and to learn Rust, so feel free to contribute!
Should work from 11.00 to 7.0.
I have tested this on:
- [X] 11.00## Run
Donwload latest release and then run it:```
sudo yapppwn --interface --fw --stage-1 --stage-2
```The help message:
```
sudo yapppwn -h[+] YAPPPWN [+]
YAPPPWN, Yet Another PPPwn (in Rust)Usage: yapppwn --interface --fw --stage-1 --stage-2
Options:
-i, --interface Interface where the ps4 is connected to
--fw Firmware version from 1100 (11.00) to 900 (9.00)
--stage-1 Stage 1 Payload Path
--stage-2 Stage 2 Payload Path
-h, --help Print help
-V, --version Print version
```## Build from source
Build the project:```
cargo build
```## Known Bugs
- It is not endian agnostic atm.## FAQ
### Why?
I wanted to learn Rust and was curious about the inner workings of the exploit by theFlow.### Why did you use X instead of Y?
I'm still learning. If Y is better than X, please feel free to open a pull request and explain!## Authors
- [@fedebuonco](https://www.github.com/fedebuonco)
## Acks
Thanks to TheOfficialFloW for this amazing exploit.
Thanks to [LowLevelLearning](https://www.youtube.com/lowlevellearning), whose video sparked my curiosity about this exploit.
Thanks to Claude and ChatGPT, both very helpful, especially in setting up some unit tests.