Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Nimdsphax 3DS: Difference between revisions

From GameBrew
(Created page with "{{Infobox 3DS Homebrews |title=nimdsphax |image=3ds.png |description=Exploiting NIM with ctr-httpwn to ipctakeover DSP for GPUPROT set and reach kernel. |author=luigoalma |lastupdated=2023/07/19 |type=Exploits |version=1.0 |license=Mixed |download=https://dlhb.gamebrew.org/3dshomebrews/nimdsphax3ds.7z |website=https://github.com/luigoalma/nimdsphax |source=https://github.com/luigoalma/nimdsphax |discussion= }} {{#seo: |title= (Exploits) - GameBrew |title_mode=append |ima...")
 
m (Text replacement - "|discussion=" to "|donation=")
 
Line 11: Line 11:
|website=https://github.com/luigoalma/nimdsphax
|website=https://github.com/luigoalma/nimdsphax
|source=https://github.com/luigoalma/nimdsphax
|source=https://github.com/luigoalma/nimdsphax
|discussion=
|donation=
}}
}}
{{#seo:
{{#seo:

Latest revision as of 01:01, 14 August 2023

nimdsphax
3ds.png
General
Authorluigoalma
TypeExploits
Version1.0
LicenseMixed
Last Updated2023/07/19
Links
Download
Website
Source

Nimdsphax is an altered version of nimhax. It is designed to "pwn dsp" with an emulated ps:ps service, set GPUPROT, and exploit kernel. This project is a form of "homebrew" software, which is unofficial software made by amateur developers for closed systems such as the 3DS. In the context of this project, "pwn" is a term used in the hacker community to mean gaining control of a system or exploiting its vulnerabilities

Required sysmodule versions

  • httpwn is fixed up for HTTP v14336 (introduced in 11.4)
  • nimhax is prepared for NIM v14341 (introduced in 11.8)
  • dsp pwn is prepared for DSP v7169 (introduced in 11.1)

Any version between since 11.8 until and including 11.17 (latest as of this writing) should be able to run it fine.

Installation

  • Just place the nimdsphax folder itself in /3ds/ on the sdcard, not the individual contents.
  • The exploit tries to execute immediately after running.
  • On *hax xml takeover runs, there's a chance of it failing to run on a red screen, this is an xml takeover issue.
  • Despite using nim:s, online connection is not required.

Changelog

v1.0

  • First Release.

Credits

(Included credits from original ctr-httpwn)

External links

Advertising: