Executes arm9 payload in 2.1 firm through spider 2.1
- Prepare arm9 payload by using the framebuffer addresses stored in(CakeHax style):
or using the fixed spider framebuffer addresses:
top left -> 0x23FFFE00 top right -> 0x23FFFE04 bottom -> 0x23FFFE08
top left 1 -> 0x181E6000 top left 2 -> 0x18273000 bottom 1 -> 0x1848F000 bottom 2 -> 0x184C7800
- The arm9 payload will be loaded to 0x23F000000 so modify your linker script if required
- Name payload as arm9.bin, copy to root as SD card along with arm11.bin(from compiling 2xrsa) and visit http://dukesrg.github.io/2xrsa.html?arm11.bin to execute.
- Normmatt for the rsa exploit
- dukesrg for rop3ds and hosting
- Gelex for debugging and testing
- dark_samus_, others for testing
- anon contrib for initial version of stager