Sony PlayStation 4 (PS4) versions prior to 6.20 webkit code execution proof of concept exploit.
e2982ee229f2067625d2625216e7ca8c6908d538834011d689f00975cf3ebf83
Sony Playstation 4 version 5.05 BPF double-free kernel exploit whitepaper.
d3791d211edccd00f5cce35e5fdaeda4507abf8931cd6da09ca7249ad7aee8fc
This is a whitepaper describing the Sony Playstation 4 (PS4) webkit setAttributeNodeNS use-after-free vulnerability.
14a01bece77ecdc9d7053e8a98f004b5c09d8502486e1d85f81508e652194877
In this project you will find a full implementation of the "bpf" kernel exploit for the PlayStation 4 on 4.55. It will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. This release however, does not contain any code related to defeating anti-piracy mechanisms or running homebrew. This exploit does include a loader that listens for payloads on port 9020 and will execute them upon receival.
eba51f80848f00f666976cb2e9bb1936b74c8847d8afaa983131dfe6a891da56
In this project you will find a full implementation of the "namedobj" kernel exploit for the PlayStation 4 on 4.05. It will allow you to run arbitrary code as kernel in order to allow jailbreaking and kernel-level modifications to the system. This release does not contain any code related to defeating anti-piracy mechanisms or running homebrew. This exploit does include a loader that listens for payloads on port 9020 and will execute them.
efb9110b6f5259cec31c5c9d64ebc617e49aceaa50877b76a7c68c3811731a96