Skip to content
This repository has been archived by the owner on Nov 21, 2019. It is now read-only.

Commit

Permalink
Update source.md
Browse files Browse the repository at this point in the history
  • Loading branch information
yifanlu committed Apr 16, 2017
1 parent f60ced2 commit eb8f0ca
Showing 1 changed file with 2 additions and 5 deletions.
7 changes: 2 additions & 5 deletions source.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,17 +3,14 @@ layout: page
permalink: /source/
---

We plan to open source the entire project at some point. For now, parts have been open sourced.
All parts of HENkaku are free and open source.

* [HENkaku](https://github.com/henkaku/henkaku) exploit, the bootstrap installer, and the installed plugins.
* [VitaShell](https://github.com/TheOfficialFloW/VitaShell) is maintained by The_FloW and is re-branded as molecularShell with permission.
* This [site](https://github.com/henkaku/henkaku.github.io) is hosted on Github Pages and the licensing information is in the footer.
* The dynamic installer is released for [self hosting](https://github.com/henkaku/henkaku/releases/latest) as a Go server.
* The WebKit exploit as a [ROP chain](https://github.com/henkaku/henkaku/tree/stage-2).

We also have technical documentation of the exploits used.

* The initial [WebKit exploit](https://blog.xyz.is/2016/webkit-360.html)
* The [offline payload](https://blog.xyz.is/2016/henkaku-offline-installer.html)
* The [kernel exploit](https://blog.xyz.is/2016/vita-netps-ioctl.html)

Finally, we [challenge worthy hackers](http://yifan.lu/2016/08/05/henkaku-koth-challenge/) to reverse the rest of the exploit. We open-source each component as soon as it has been reversed.

0 comments on commit eb8f0ca

Please sign in to comment.