Viper Pegasus Development Team PS3 CFW WIP
Viper Pegasus Development Team
Hello I am MXXI, I am a member of the Viper Pegasus Development Team. We are looking for people who have knowledge of CFW / JB / MFW, our goal Create a CFW can install on OFW 4.31 & 4.21, 4.25, 4.30 things that have been successful:
LV2 kernel patched with the found keys
Appldr patched with the found keys
First BETA successfully installed on OFW 4.21
Status: 25%
30% : First Public BETA
50% : Second Public BETA
75% : First Public RELASE
100% : Download
If you want to help contact me below.
|
Данная группа хакеров утверждает что у них в наличии PUBLIC/PRIVATE ключи!
PS3 LV1, LV2 & IDA Files Decrypted / Encrypted by Viper Pegasus Team:
Following up on the PlayStation 3 Appldr, Dev_Flash and Keys from PS3 Firmware 4.31, today the Viper Pegasus Dev Team have released PS3 4.31 LV1, LV2 and IDA files both decrypted and encrypted for use with http://www.hex-rays.com/products/ida...download.shtml.
Download: PS3 4.31 LV1, LV2 & IDA Files Decrypted / Encrypted / PS3 4.31 LV1, LV2 & IDA Files Decrypted / Encrypted
(Mirror) / PS3 4.31 ISO Files
PS3 Firmware Version: 4.31
ZIP Files: - lv1.elf // LV1.elf decrypted
- lv1.self // LV1.self
- lV2_kernel.elf // LV2_kernel.elf decrypted
- lv2_kernel.self // lv2_kernel.self
- lv1.idc // IDA script
- sc_iso.elf // sc_iso.elf decrypted
- sc_iso.self // sc_iso.self
- sb_iso_spu_module.elf // sb_iso_spu_module.elf decrypted
- sb_iso_spu_module.self // sb_iso_spu_module.self

IDA log (LV2):
Found hypercall allocate_memory(0) at address 0x295C7C
Found hypercall allocate_memory(0) at address 0x295CD8
источник
Последний раз редактировалось akela1979; 20.11.2012 в 08:04.
|