zoogie / ninjhax2-dx

One QR Ninjhax returns

Home Page:https://zoogie.github.io/web/nh2dx

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

I N E E D H E L P

gnomeboyo opened this issue · comments

the meat of it is, i modded my 3ds 3 weeks back and updated it without looking up what it did ( hence not knowing that it was a RECENT update). sometime after the update, i accidentally installed more than 300 3ds games and it crashed, erasing FBI and Homebrew as well as some other titles that were added with HBshop. now left with no answer, i saw online that ninjhax still works for 11.17.xx, so i tried it with a copy i bought online, then the 3ds crashed again after scanning the QR code (old 3ds/US). now everytime i open the QRcode scanner it freaks out then powers off. i thought i could save it but formating it doesn't work

now i'm stuck with and old luma version, no access to GM9 AND cubic ninja
I N E E D H E L P

commented

Userland exploits like ninjhax/ninjhax-dx will crash when run under luma. But when you have luma, you don't need to run these type of exploits anyway: your system is already hacked to the maximum if its running luma.

Go to this discord and they'll help you with your actual problem, that's out of the scope of ninjhax issues. https://discord.gg/C29hYvh

commented

Hi @zoogie - As you've already made out no point doing this - however as part of running some education exercises I wanted to revisit ninjahax as 1. its easy to demo 2. it looks pretty mental and good for getting people interested in hacking all the things :) , you know the gist. I'm already running modded firmware at this point and could grab a new one but probably won't arrive in time

Just to pop the question - Is it just a case of offsets and buffs being changed for this exploit to work under luma or is it more complex than that?

Thanks!

Hi @zoogie - As you've already made out no point doing this - however as part of running some education exercises I wanted to revisit ninjahax as 1. its easy to demo 2. it looks pretty mental and good for getting people interested in hacking all the things :) , you know the gist. I'm already running modded firmware at this point and could grab a new one but probably won't arrive in time

Just to pop the question - Is it just a case of offsets and buffs being changed for this exploit to work under luma or is it more complex than that?

Thanks!

Sorry for overlooking your reply, don't know how that happened :(

Anyway, I have a specially modified older version of luma3ds that can run userland exploits. It was Rosaliina, a big feature introduced in luma3ds 8.0, that broke the userland stuff. This version I'm attaching here is v7.1, with native firm bug patches backported to that version.

boot71.zip
Just rename boot71.firm to boot.firm and place in sd root. (turn on arm11 exceptions too)