 [PS4] Release bzImages KHEOPS 2.1 PS4 fat slim pro aeolia belize baikal
[PS4] Release bzImages KHEOPS 2.1 PS4 fat slim pro aeolia belize baikal [PS5] Gezine progresse encore sur Y2JB
[PS5] Gezine progresse encore sur Y2JB [PS4/PS5] Zecoxao apporte des précisions sur le bug d'interface exploitable
[PS4/PS5] Zecoxao apporte des précisions sur le bug d'interface exploitable [DSi] NAND Title Manager v0.4.0 supporte Unlaunch
[DSi] NAND Title Manager v0.4.0 supporte UnlaunchNom :
Autre information :
Xbox 360 reset glitch hack v1.00
================================
1- List of folders and what they are for:
\common                      : Common files between slim 360s and fat 360s.
\common\lptjtag_programmer   : Schematics for a simple cpld programmer using PC LPT parallel port. You need to power both the programmer and the CPLD with 3.3 volts.
\common\imgbuild             : Python script to build a NAND flash image.
\common\cdxell               : Replacement CD that runs Xell, CDjasper is for jaspers and CD is for anything else.
\common\xell                 : Xell image, reset glitch hack version.
\fat                         : Files for fat 360s.
\fat\glitch48nofullpost      : CPLD code, one for each hardware revision.
\fat\wiring                  : Schematics and pictures.
\slim                        : Files for slim 360s.
\slim\glitchslimnodp         : CPLD code.
\slim\wiring                 : Schematics and pictures.
2- Basic procedure for fat 360s (zephyr, jasper)
  2.1- Program the CPLD using Xilinx Impact, a CPLD programmer of your choice and the JED file for your 360 hardware revision.
  2.2- Wire your 360 using the schematics and pictures located in /fat/wiring
         - If you are using a CMOD board, don't forget to remove R2 and short R3 on it.
         - Wire ground with thicker wire.
  2.3- Build the NAND image, eg for a jasper the command should be something like:
         python common\imgbuild\build.py original_nand.ecc common\cdxell\CDjasper common\xell\xell-gggggg.bin
       (You need to dump your NAND prior to that)
       (If you don't have a jasper, you'll need a copy of a stock plaintext jasper SMC (v2.3) )
  2.4- Flash the resulting output\image_00000000.ecc using the NandPro +w command.
3- Basic procedure for slim 360s (trinity)
  3.1- Program the CPLD using Xilinx Impact, a CPLD programmer of your choice and the JED file for your 360 hardware revision.
  3.2- Wire your 360 using the schematics and pictures located in /slim/wiring.
         
         - If you are using a CMOD board, don't forget to remove R2 connect upper pad of R2 to lower pad of R1 on the CMOD.
         - Wire ground with thicker wire.
  3.3- Build the NAND image, eg the command should be something like:
         python common\imgbuild\build.py original_nand.ecc common\cdxell\CD common\xell\xell-gggggg.bin
       (You need to dump your NAND prior to that)
  3.4- Flash the resulting output\image_00000000.ecc using the NandPro +w command.
4- Enjoy your hacked 360 =)
5- Credits:
GliGli, Tiros: Reverse engineering and hack development.
cOz: Reverse engineering, beta testing.
Razkar, tuxuser: beta testing.
cjak, Redline99, SeventhSon, tmbinc, anyone I forgot... : Prior reverse engineering and/or hacking work on the 360.