Difference between revisions of "List of 3DS exploits"
From WikiTemp, the GBAtemp wiki
(25 intermediate revisions by 9 users not shown) | |||
Line 14: | Line 14: | ||
| [[arm9loaderhax]] | | [[arm9loaderhax]] | ||
| Installer: O3DS: 2.1 N3DS: 9.0-9.2<br />If installed: Any (Version supported depends on CFW used) | | Installer: O3DS: 2.1 N3DS: 9.0-9.2<br />If installed: Any (Version supported depends on CFW used) | ||
− | | ARM9 | + | | ARM9 Kernel |
− | | Exploit for the arm9loader to enable the execution of ARM9 code at boot. Requires console-specific OTP hash from 2.1 to build from source, but that's not necessary on N3DS (However, you've to use the N3DS 10.0 NATIVE_FIRM as firm0_100.bin in A9LH folder | + | | Exploit for the arm9loader to enable the execution of ARM9 code at boot. Requires console-specific OTP hash from 2.1 to build from source, but that's not necessary on N3DS (However, you've to use the N3DS 10.0 NATIVE_FIRM as firm0_100.bin in A9LH folder |
| [[User:delebile|delebile]], [[User:plutoo|plutoo]], [[User:yellows8|yellows8]] | | [[User:delebile|delebile]], [[User:plutoo|plutoo]], [[User:yellows8|yellows8]] | ||
| [https://github.com/delebile/arm9loaderhax Git] | | [https://github.com/delebile/arm9loaderhax Git] | ||
|- | |- | ||
| [[basehaxx]] | | [[basehaxx]] | ||
− | | 9.0 to 11. | + | | 9.0 to 11.2 |
| ARM11 Userland | | ARM11 Userland | ||
| Exploit of secret bases in ''Pokémon Omega Ruby'' and ''Alpha Sapphire'' | | Exploit of secret bases in ''Pokémon Omega Ruby'' and ''Alpha Sapphire'' | ||
Line 27: | Line 27: | ||
|- | |- | ||
| [[BASICsploit]] | | [[BASICsploit]] | ||
− | | 9.0 to 11.0 | + | | 9.0 to 11.0 (Only USA) |
− | |ARM11 Userland | + | | ARM11 Userland |
− | | Exploits how the game works to download and run the hax | + | | Exploits how the game works to download and run the *hax code |
| [[User:Nba_Yoh|Nba_Yoh]] | | [[User:Nba_Yoh|Nba_Yoh]] | ||
| [https://mrnbayoh.github.io/basicsploit/ Website] | | [https://mrnbayoh.github.io/basicsploit/ Website] | ||
+ | <!-- | ||
+ | |- | ||
+ | | Boot9Strap : See below | ||
+ | | | ||
+ | --> | ||
|- | |- | ||
| [[browserhax]] | | [[browserhax]] | ||
Line 41: | Line 46: | ||
|- | |- | ||
| [[dsiwarehax]] | | [[dsiwarehax]] | ||
− | | 9.0 to | + | | 9.0 to 11.2 |
− | | | + | | ARM9 Kernel |
− | | An exploit for <abbr title="Fieldrunners,Legends of Exidia,Guitar Rock Tour,The Legend of Zelda: Four Swords (Anniversary Edition)">specifically 4 dsiware games</abbr> that takes advantage of an oversight which allows writing to the NAND in DSi mode. Mainly used to downgrade the | + | | An exploit for <abbr title="Fieldrunners, Legends of Exidia, Guitar Rock Tour, The Legend of Zelda: Four Swords (Anniversary Edition)">specifically 4 dsiware games</abbr> that takes advantage of an oversight which allows writing to the NAND in DSi mode. Mainly used to downgrade the NATIVE_FIRM. Needs ARM11 Kernel access to install it. Actually this is obsolete but probably in the future we'll need it again... |
− | | [[User: | + | | [[User:Yellows8|Yellows8]] |
| [https://github.com/yellows8/3ds_dsiwarehax_installer/releases Git] | | [https://github.com/yellows8/3ds_dsiwarehax_installer/releases Git] | ||
+ | |- | ||
+ | | [[ctpkpwn_tfh]] | ||
+ | | 9.9 to 11.3 | ||
+ | | ARM11 Userland | ||
+ | | A exploit for the game Triforce Heros, it requires an internet connection during install due to the fact that it uses SpotPass to install. | ||
+ | | [[User:Yellows8|Yellows8]] | ||
+ | | [https://github.com/yellows8/ctpkpwn Git] | ||
+ | |- | ||
+ | | [[DoodleBomb]] | ||
+ | | 9.0 to 11.4 | ||
+ | | ARM11 Userland | ||
+ | | A exploit to access the Homebrew launcher with SwapDoodle, allows you to boot a friend into the Homebrew launcher as well. | ||
+ | | [[User:MrNbaYoh|MrNbaYoh]] | ||
+ | | [https://mrnbayoh.github.io/doodlebomb/ Git] | ||
|- | |- | ||
| [[Fasthax]] | | [[Fasthax]] | ||
− | | | + | | 9.0 to 11.2 |
| ARM11 kernel | | ARM11 kernel | ||
− | | | + | | Exploits ARM11 Kernel access on most recent versions |
| [[User:nedwill|nedwill]] | | [[User:nedwill|nedwill]] | ||
| [https://github.com/nedwill/fasthax Git] | | [https://github.com/nedwill/fasthax Git] | ||
|- | |- | ||
| [[freakyhax]] | | [[freakyhax]] | ||
− | | 9.0 to 11. | + | | 9.0 to 11.7 |
| ARM11 Userland | | ARM11 Userland | ||
| Exploit for the game ''Freaky Forms Deluxe'' | | Exploit for the game ''Freaky Forms Deluxe'' | ||
Line 62: | Line 81: | ||
|- | |- | ||
| [[Genhax]] | | [[Genhax]] | ||
− | | 9.0 to 11. | + | | 9.0 to 11.7 |
| ARM11 Userland | | ARM11 Userland | ||
| Exploit for the game ''Monster Hunter Generations'' (primary installer only compatible with JPN version of the game) | | Exploit for the game ''Monster Hunter Generations'' (primary installer only compatible with JPN version of the game) | ||
Line 69: | Line 88: | ||
|- | |- | ||
| [[heaphax]] | | [[heaphax]] | ||
− | | | + | | None |
| ARM11 Kernel | | ARM11 Kernel | ||
− | | Another kernel exploit | + | | Another kernel exploit never released. Stated by smealum that it was mostly fixed in 11.0.0 |
| [[User:Smealum|Smealum]] | | [[User:Smealum|Smealum]] | ||
| | | | ||
|- | |- | ||
| [[humblehax]] | | [[humblehax]] | ||
− | | 9.0 to 11. | + | | 9.0 to 11.7 |
| ARM11 Userland | | ARM11 Userland | ||
| Exploit for the game ''Citizens of Earth''. | | Exploit for the game ''Citizens of Earth''. | ||
Line 97: | Line 116: | ||
|- | |- | ||
| [[menuhax]] | | [[menuhax]] | ||
− | | 9.0 to 11. | + | | 9.0 to 11.2 |
| ARM11 Userland | | ARM11 Userland | ||
− | | Exploit for the custom theme feature of the | + | | Exploit for the custom theme feature of the HOME menu. |
| [[User:yellows8|yellows8]] | | [[User:yellows8|yellows8]] | ||
| [https://github.com/yellows8/3ds_homemenuhax Git] | | [https://github.com/yellows8/3ds_homemenuhax Git] | ||
|- | |- | ||
| [[MSET exploit]] | | [[MSET exploit]] | ||
− | | 4.1 to 4.5<br />N3DS: 9.0 to 9.2 | + | | 4.1 to 4.5 <br /> 6.0 to 6.3<br />N3DS: 9.0 to 9.2 |
− | | ARM9 | + | | ARM9 Kernel |
| Exploit for the System Settings application (MSET). Used by Gateway-3DS since flashcart firmware v1.x. "NEW" 3DS (N3DS) users can use the MSET Exploit by installing the old System Settings app from 3ds ver 4.5 over the existing one via the .CIA provided in newer GateWay Omega packages. | | Exploit for the System Settings application (MSET). Used by Gateway-3DS since flashcart firmware v1.x. "NEW" 3DS (N3DS) users can use the MSET Exploit by installing the old System Settings app from 3ds ver 4.5 over the existing one via the .CIA provided in newer GateWay Omega packages. | ||
| [[User:ichfly|ichfly]] (Darkfader on NDS) | | [[User:ichfly|ichfly]] (Darkfader on NDS) | ||
Line 111: | Line 130: | ||
|- | |- | ||
| [[ninjhax]] | | [[ninjhax]] | ||
− | | Version1: 4.5 to 9.2<br />Version2: 9.0 to 11. | + | | Version1: 4.5 to 9.2<br />Version2: 9.0 to '''11.7''' |
| ARM11 Userland | | ARM11 Userland | ||
− | | Exploit for the game ''Cubic Ninja''. | + | | Exploit for the game ''Cubic Ninja''. |
| [[User:Smealum|Smealum]] | | [[User:Smealum|Smealum]] | ||
| Version1: [https://github.com/smealum/ninjhax Git]<br />Version2: [https://github.com/smealum/ninjhax2.x Git] | | Version1: [https://github.com/smealum/ninjhax Git]<br />Version2: [https://github.com/smealum/ninjhax2.x Git] | ||
Line 119: | Line 138: | ||
| [[NTRCardHax]] | | [[NTRCardHax]] | ||
| Supposedly 9.0 to 10.7 | | Supposedly 9.0 to 10.7 | ||
− | | ARM9 | + | | ARM9 Kernel |
| Exploits a bug in the DS cartridge loader part of ARM9 to gain access to it. It's supposed to be a new way to make CFW's on new versions, but no one has started working on it. | | Exploits a bug in the DS cartridge loader part of ARM9 to gain access to it. It's supposed to be a new way to make CFW's on new versions, but no one has started working on it. | ||
| [[User:Plutoo|Plutoo]] | | [[User:Plutoo|Plutoo]] | ||
Line 125: | Line 144: | ||
|- | |- | ||
| [[oot3dhax]] | | [[oot3dhax]] | ||
− | | Version1: 2.0 to 9.2<br />Version2: 9.2 to 11. | + | | Version1: 2.0 to 9.2<br />Version2: 9.2 to '''11.7 (unstable on higher firmwares)''' |
| ARM11 Userland | | ARM11 Userland | ||
| Save game exploit for ''The Legend of Zelda: Ocarina of Time 3D''. Also used by Gateway since flashcart firmware v3.1.0 to add N3DS support. It can be installed trough [[oot3dhax installer]], save dongle, or also a gamecard data backup/restore homebrew. It already works on 11.x, but it seems it's harder to use it on that version since you have to load a save on there with a card cheat dongle. | | Save game exploit for ''The Legend of Zelda: Ocarina of Time 3D''. Also used by Gateway since flashcart firmware v3.1.0 to add N3DS support. It can be installed trough [[oot3dhax installer]], save dongle, or also a gamecard data backup/restore homebrew. It already works on 11.x, but it seems it's harder to use it on that version since you have to load a save on there with a card cheat dongle. | ||
Line 132: | Line 151: | ||
|- | |- | ||
| [[painthax]] | | [[painthax]] | ||
− | | 9.0 to 11. | + | | 9.0 to 11.7 |
| ARM11 Userland | | ARM11 Userland | ||
| Save game exploit through the game ''Pixel Paint'' | | Save game exploit through the game ''Pixel Paint'' | ||
Line 138: | Line 157: | ||
| [https://github.com/MrNbaYoh/painthax/releases Git] | | [https://github.com/MrNbaYoh/painthax/releases Git] | ||
|- | |- | ||
− | | | + | | [[safehax]] |
− | | 9.0 to 11. | + | | 9.0 to 11.3 |
− | | ARM9 | + | | ARM9 Kernel |
− | | Exploit using the homebrew launcher to run files named "ARM9.bin" such as | + | | Exploit using the homebrew launcher to run files named "ARM9.bin" such as Decrypt9. Needs ARM11 Kernel access in order to run it. 1.1 release has now support of 11.3 |
| [[User:TiniVi|TiniVil]] | | [[User:TiniVi|TiniVil]] | ||
| [https://github.com/TiniVi/safehax Git] | | [https://github.com/TiniVi/safehax Git] | ||
|- | |- | ||
− | | [[ | + | | [[sighax]] |
− | | | + | | All current versions |
− | | ARM9 | + | | ARM9 BootROM |
− | | | + | | Exploit that uses a vulnerability in the RSA signature checking of the ARM9 BootROM. [http://sighax.com Official Website]<br />'''Note:''' Only use the installer if you are an advanced user. Misuse can lead to bricks. Most users will want to use Boot9Strap instead. |
− | | [[User: | + | | [[User:derrek|derrek]] |
− | | | + | | |
|- | |- | ||
| [[smashbroshax]] (beaconhax) | | [[smashbroshax]] (beaconhax) | ||
− | | 9.0 to 11. | + | | 9.0 to 11.3 (N3DS only) |
| ARM11 Userland | | ARM11 Userland | ||
− | | Uses a wifi beacon to run a exploit for the game ''Super Smash Bros. for Nintendo 3DS''. | + | | Uses a wifi beacon to run a exploit for the game ''Super Smash Bros. for Nintendo 3DS''. |
| [[User:yellows8|yellows8]] | | [[User:yellows8|yellows8]] | ||
| [https://github.com/yellows8/3ds_smashbroshax Git] | | [https://github.com/yellows8/3ds_smashbroshax Git] | ||
Line 162: | Line 181: | ||
| Gateway: 2.0.0-7 to 9.2.0-20 <br/>Homebrew: 2.0.0-7 to 9.5.0-22 | | Gateway: 2.0.0-7 to 9.2.0-20 <br/>Homebrew: 2.0.0-7 to 9.5.0-22 | ||
| ARM11 Userland | | ARM11 Userland | ||
− | | Exploit for the Nintendo 3DS web browser (spider). Used by Gateway since flashcart firmware v3.0.<br/>Used by homebrew like [[Regionthree]]. | + | | Exploit for the Nintendo 3DS web browser (spider). Used by Gateway since flashcart firmware v3.0.<br/>Used by homebrew like [[Regionthree]] or the Pokémon Injector via QR. |
| [[User:MathewE|MathewE]], Gateway(?) | | [[User:MathewE|MathewE]], Gateway(?) | ||
| | | | ||
Line 174: | Line 193: | ||
|- | |- | ||
| [[Soundhax]] | | [[Soundhax]] | ||
− | | | + | | 9.0 to 11.3 |
| ARM11 Userland | | ARM11 Userland | ||
− | | | + | | Exploit for the Nintendo 3DS Sound application to run a specially crafted .m4a file ( http://soundhax.com/ ) which runs a *hax payload (for 9.0-11.3 you'll need otherapp payloads from http://smealum.github.io/3ds/ ) |
| [[User:nedwill|nedwill]] | | [[User:nedwill|nedwill]] | ||
| [https://github.com/nedwill/soundhax Git]<br />[https://gbatemp.net/threads/how-to-use-soundhax.454760/ How-to guide] | | [https://github.com/nedwill/soundhax Git]<br />[https://gbatemp.net/threads/how-to-use-soundhax.454760/ How-to guide] | ||
|- | |- | ||
| [[steelhax]] | | [[steelhax]] | ||
− | | 9.0 to 11. | + | | 9.0 to 11.7 |
| ARM11 Userland | | ARM11 Userland | ||
| Expoits the ''Steeldiver Subwars'' savedata for homebrew. | | Expoits the ''Steeldiver Subwars'' savedata for homebrew. | ||
Line 188: | Line 207: | ||
|- | |- | ||
| [[stickerhax]] | | [[stickerhax]] | ||
− | | 9.0 to 11. | + | | 9.0 to 11.7 |
| ARM11 Userland | | ARM11 Userland | ||
| Expoits the ''Paper Mario: Sticker Star'' savedata for homebrew. | | Expoits the ''Paper Mario: Sticker Star'' savedata for homebrew. | ||
Line 196: | Line 215: | ||
| [[sudokuhax]] | | [[sudokuhax]] | ||
| 4.0 to 9.2 | | 4.0 to 9.2 | ||
− | | | + | | ARM9 Kernel |
| Exploit for the ''Sudoku'' DSiWare game used to boot Nintendo DS homebrews. Requires to inject the modified game into the Internet settings for Nintendo DS into the NAND. | | Exploit for the ''Sudoku'' DSiWare game used to boot Nintendo DS homebrews. Requires to inject the modified game into the Internet settings for Nintendo DS into the NAND. | ||
− | | [[Team | + | | [[Team Twiizers]] |
| [https://hackmii.com/2011/01/sudokuhax-release/ Website] | | [https://hackmii.com/2011/01/sudokuhax-release/ Website] | ||
|- | |- | ||
| [[supermysterychunkhax]] | | [[supermysterychunkhax]] | ||
− | | USA/JPN: 9.9 to 11. | + | | USA/JPN: 9.9 to 11.7 (unstable on higher firmware) |
− | EUR: 10.2 to 11. | + | EUR: 10.2 to 11.7 (unstable on higher firmware) |
| ARM11 Userland | | ARM11 Userland | ||
| Save game exploit for ''Pokémon Super Mystery Dungeon''. | | Save game exploit for ''Pokémon Super Mystery Dungeon''. | ||
Line 222: | Line 241: | ||
| [[User:Smealum|Smealum]] | | [[User:Smealum|Smealum]] | ||
| [https://github.com/smealum/tubehax Git] | | [https://github.com/smealum/tubehax Git] | ||
+ | |- | ||
+ | | [[udsploit]] | ||
+ | | 11.3 only | ||
+ | | ARM11 Userland | ||
+ | | Exploit that allows ARM11 kernel access on 11.3 firmware | ||
+ | | [[User:smealum|smealum]] | ||
+ | | [https://github.com/smealum/udsploit Git] | ||
|- | |- | ||
| [[v*hax]] | | [[v*hax]] | ||
Line 237: | Line 263: | ||
| [[User:Mrrraou|Mrrraou]] | | [[User:Mrrraou|Mrrraou]] | ||
| [https://github.com/Mrrraou/waithax Git] | | [https://github.com/Mrrraou/waithax Git] | ||
+ | |} | ||
+ | |||
+ | ==sighaxed firmwares== | ||
+ | This is a list of firmwares that utilize the sighax exploit. | ||
+ | |||
+ | {| class="prettytable sortable" style="width:100%" | ||
+ | ! style="width:13%" | Title | ||
+ | ! class="unsortable" | Description | ||
+ | ! style="width:18%" | Author | ||
+ | ! class="unsortable" style="width:8%" | Source | ||
+ | |- | ||
+ | | [[Boot9Strap]] | ||
+ | | A firmware that loads a payload from the SD card in the form of boot.firm. It is also capable of dumping the BootROMs (Boot9 & Boot11) and OTP of the system. | ||
+ | | [[User:SciresM|SciresM]], [[User:Hedgeberg|Hedgeberg]] | ||
+ | | [https://github.com/SciresM/boot9strap Git]<br />[https://github.com/d0k3/SafeB9SInstaller Installer] | ||
|} | |} |
Latest revision as of 20:48, 23 July 2018
3DS Homebrew | |
---|---|
Introduction • Homebrew Development • Glossary • Flashcart FAQ | |
Lists | All Homebrew • Applications • Games • Emulators • Demos • CFWs • Exploits • Development libraries & tools • PC Utilities |
If you find an exploit not listed please feel free to PM me @HolyHobo, I'll try to keep this page up to date.
Title | Compatibility | Type | Description | Author | Source |
---|---|---|---|---|---|
arm9loaderhax | Installer: O3DS: 2.1 N3DS: 9.0-9.2 If installed: Any (Version supported depends on CFW used) |
ARM9 Kernel | Exploit for the arm9loader to enable the execution of ARM9 code at boot. Requires console-specific OTP hash from 2.1 to build from source, but that's not necessary on N3DS (However, you've to use the N3DS 10.0 NATIVE_FIRM as firm0_100.bin in A9LH folder | delebile, plutoo, yellows8 | Git |
basehaxx | 9.0 to 11.2 | ARM11 Userland | Exploit of secret bases in Pokémon Omega Ruby and Alpha Sapphire | MrNbaYoh | Website Git |
BASICsploit | 9.0 to 11.0 (Only USA) | ARM11 Userland | Exploits how the game works to download and run the *hax code | Nba_Yoh | Website |
browserhax | 2.1 to 11.0 | ARM11 Userland | Exploit for the 3DS web browser. | yellows8 | Git |
dsiwarehax | 9.0 to 11.2 | ARM9 Kernel | An exploit for specifically 4 dsiware games that takes advantage of an oversight which allows writing to the NAND in DSi mode. Mainly used to downgrade the NATIVE_FIRM. Needs ARM11 Kernel access to install it. Actually this is obsolete but probably in the future we'll need it again... | Yellows8 | Git |
ctpkpwn_tfh | 9.9 to 11.3 | ARM11 Userland | A exploit for the game Triforce Heros, it requires an internet connection during install due to the fact that it uses SpotPass to install. | Yellows8 | Git |
DoodleBomb | 9.0 to 11.4 | ARM11 Userland | A exploit to access the Homebrew launcher with SwapDoodle, allows you to boot a friend into the Homebrew launcher as well. | MrNbaYoh | Git |
Fasthax | 9.0 to 11.2 | ARM11 kernel | Exploits ARM11 Kernel access on most recent versions | nedwill | Git |
freakyhax | 9.0 to 11.7 | ARM11 Userland | Exploit for the game Freaky Forms Deluxe | plutoo | Website Git |
Genhax | 9.0 to 11.7 | ARM11 Userland | Exploit for the game Monster Hunter Generations (primary installer only compatible with JPN version of the game) | svanheulen | Git |
heaphax | None | ARM11 Kernel | Another kernel exploit never released. Stated by smealum that it was mostly fixed in 11.0.0 | Smealum | |
humblehax | 9.0 to 11.7 | ARM11 Userland | Exploit for the game Citizens of Earth. | shinyquagsire23 | Website |
ironhax | 9.5 to 10.3 | ARM11 Userland | Exploit for the game IronFall: Invasion. | Smealum | Git |
MemChunkHax | Version1: 4.5 to 9.2 Version2: 9.0 to 10.3 Version3: 10.4 to 10.7 |
ARM11 Kernel | Exploits pieces of the 3ds memory to access the ARM11 Kernel. | yellows8 | |
menuhax | 9.0 to 11.2 | ARM11 Userland | Exploit for the custom theme feature of the HOME menu. | yellows8 | Git |
MSET exploit | 4.1 to 4.5 6.0 to 6.3 N3DS: 9.0 to 9.2 |
ARM9 Kernel | Exploit for the System Settings application (MSET). Used by Gateway-3DS since flashcart firmware v1.x. "NEW" 3DS (N3DS) users can use the MSET Exploit by installing the old System Settings app from 3ds ver 4.5 over the existing one via the .CIA provided in newer GateWay Omega packages. | ichfly (Darkfader on NDS) | |
ninjhax | Version1: 4.5 to 9.2 Version2: 9.0 to 11.7 |
ARM11 Userland | Exploit for the game Cubic Ninja. | Smealum | Version1: Git Version2: Git |
NTRCardHax | Supposedly 9.0 to 10.7 | ARM9 Kernel | Exploits a bug in the DS cartridge loader part of ARM9 to gain access to it. It's supposed to be a new way to make CFW's on new versions, but no one has started working on it. | Plutoo | |
oot3dhax | Version1: 2.0 to 9.2 Version2: 9.2 to 11.7 (unstable on higher firmwares) |
ARM11 Userland | Save game exploit for The Legend of Zelda: Ocarina of Time 3D. Also used by Gateway since flashcart firmware v3.1.0 to add N3DS support. It can be installed trough oot3dhax installer, save dongle, or also a gamecard data backup/restore homebrew. It already works on 11.x, but it seems it's harder to use it on that version since you have to load a save on there with a card cheat dongle. | yellows8 | Git |
painthax | 9.0 to 11.7 | ARM11 Userland | Save game exploit through the game Pixel Paint | Nba_Yoh | Git |
safehax | 9.0 to 11.3 | ARM9 Kernel | Exploit using the homebrew launcher to run files named "ARM9.bin" such as Decrypt9. Needs ARM11 Kernel access in order to run it. 1.1 release has now support of 11.3 | TiniVil | Git |
sighax | All current versions | ARM9 BootROM | Exploit that uses a vulnerability in the RSA signature checking of the ARM9 BootROM. Official Website Note: Only use the installer if you are an advanced user. Misuse can lead to bricks. Most users will want to use Boot9Strap instead. |
derrek | |
smashbroshax (beaconhax) | 9.0 to 11.3 (N3DS only) | ARM11 Userland | Uses a wifi beacon to run a exploit for the game Super Smash Bros. for Nintendo 3DS. | yellows8 | Git |
spider exploit | Gateway: 2.0.0-7 to 9.2.0-20 Homebrew: 2.0.0-7 to 9.5.0-22 |
ARM11 Userland | Exploit for the Nintendo 3DS web browser (spider). Used by Gateway since flashcart firmware v3.0. Used by homebrew like Regionthree or the Pokémon Injector via QR. |
MathewE, Gateway(?) | |
SNShax | 9.0 to 10.1 | ARM11 Kernel | Expoits the safe version of the Nintendo Shell (The shell that operates the 3ds) to access ARM11 Kernel. | Smealum | |
Soundhax | 9.0 to 11.3 | ARM11 Userland | Exploit for the Nintendo 3DS Sound application to run a specially crafted .m4a file ( http://soundhax.com/ ) which runs a *hax payload (for 9.0-11.3 you'll need otherapp payloads from http://smealum.github.io/3ds/ ) | nedwill | Git How-to guide |
steelhax | 9.0 to 11.7 | ARM11 Userland | Expoits the Steeldiver Subwars savedata for homebrew. | vegaroxas | Git |
stickerhax | 9.0 to 11.7 | ARM11 Userland | Expoits the Paper Mario: Sticker Star savedata for homebrew. | yellows8 | Git |
sudokuhax | 4.0 to 9.2 | ARM9 Kernel | Exploit for the Sudoku DSiWare game used to boot Nintendo DS homebrews. Requires to inject the modified game into the Internet settings for Nintendo DS into the NAND. | Team Twiizers | Website |
supermysterychunkhax | USA/JPN: 9.9 to 11.7 (unstable on higher firmware)
EUR: 10.2 to 11.7 (unstable on higher firmware) |
ARM11 Userland | Save game exploit for Pokémon Super Mystery Dungeon. | shinyquagsire23 | Git |
SVChax | 9.0 to 10.7 | ARM11 Kernel | Exploits services to access the ARM11 Kernel. | yellows8 | Git |
tubehax | None. | ARM11 Userland | Exploit for the YouTube application for 3DS. No longer works on any firmware. | Smealum | Git |
udsploit | 11.3 only | ARM11 Userland | Exploit that allows ARM11 kernel access on 11.3 firmware | smealum | Git |
v*hax | If installed: 2.1 to 11.0
Installer: 9.0 to 11.0 |
ARM11 Userland | Save game exploit for VVVVVV | shinyquagsire23 | Git |
waithax/slowhax | 9.0 to 11.1 | ARM11 Kernel | Exploits services to access the ARM11 kernel. | Mrrraou | Git |
sighaxed firmwares
This is a list of firmwares that utilize the sighax exploit.
Title | Description | Author | Source |
---|---|---|---|
Boot9Strap | A firmware that loads a payload from the SD card in the form of boot.firm. It is also capable of dumping the BootROMs (Boot9 & Boot11) and OTP of the system. | SciresM, Hedgeberg | Git Installer |