Skip to content
My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)
Branch: master
Clone or download
Latest commit 750fd86 Jun 21, 2018
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.idea
app 0.3 version bump Jun 20, 2018
gradle/wrapper Add missing build files and update gitignore accordingly Apr 29, 2018
.gitignore Add missing build files and update gitignore accordingly Apr 29, 2018
LICENSE Create LICENSE Apr 29, 2018
README.md Update README.md Jun 18, 2018
build.gradle Logging UI Apr 28, 2018
gradlew Add missing build files and update gitignore accordingly Apr 29, 2018
gradlew.bat Add missing build files and update gitignore accordingly Apr 29, 2018
settings.gradle

README.md

logo

NXLoader

My first Android app: Launch Fusée Gelée payloads from stock Android

Heavily based on Fusée Gelée and ShofEL2. fusee.bin is bundled as a default payload

Note: Any proprietary payloads are neither tested nor supported by this software.

Does it work on your device? Report here

Get the APK release

This app is currently in "Alpha" state, it's my first Android app and there is some rather disgusting code (Potentially blocking tasks on the UI thread 🤢). This will be improved soon™.

HOWTO:

  • Launch the app.
  • (Optional) go to the Config tab, and select a custom payload file.
  • Plug in your Switch. (On my Nexus 5, I use a micro USB OTG cable, and an A-to-C cable)
  • Put it into RCM mode. (Note: your switch will power on by itself when plugged in, be sure to hold VOL+).
  • Grant permission to the app to access the USB device.
  • Enjoy!

Note: The app does not need to be running in order to launch the payload. The phone can even be locked!

FAQ:

  • Why use this over a web-based launcher?: No internet required, and can auto-launch even if your phone is locked. Plug and play!
  • Can it load Linux?: soon™
  • Will it brick my phone/switch?: Hopefully not, but I an certainly not responsible if it does!
  • Does it need root?: Nope!

TODO:

  • Refactor the code so it's less hacky
  • Improve UI/UX
  • Implement loader for fail0verflow's Linux

For anyone who wants to look at the exploit source, the magic happens here.

You can’t perform that action at this time.