Dumper to dump/extract files required by PCSX4 from an actual PlayStation 4 console. The dumper currently supports PS4 FW ver 1.76, 4.55, 5.00, 5.05.
Visit pcsx4.com for web version or rut it from here.
Connect your computer and PS4 to the same network.
Before building, change the IP address (
#define BLOBS_ADDR IP(192,168,2,1)) found inside
source/blob.cto the IP adress of the pc where the
server.pywill be running.
Build the payload for your firmware version with
make. Pick one of the following supported firmware versions: 1.76, 4.55, 5.00, 5.05. For example:
Start the server with:
Enter your computer's IP address in the PlayStation 4 web browser and follow the instructions on screen. The exploit provided by
server.pyonly works for firmware 5.00. If you are on a different firmware you need to run an exploit manually and send the dumper payload using netcat/socat:
socat -u FILE:dumper.bin TCP:"PS4 IP":9020
This dumper requires an exploit that listens for payloads in binary format on port
9020. These payloads need to be mapped as follows in user address space:
0x926200000: Code (can be changed in
0x926300000: Data (can be changed in
0x926400000: Arguments (can be changed in
Furthermore, the server will listen at port
9021 for incoming blobs, and optionally at
9022 for debug messages.
If you want to add support for a new FW, use one of the
source/ksdk_XXX.inc as template and update the required offset to match that of your FW.
Credits: Orbital Virtualization-based PlayStation 4 emulator.
Thanks to: flatz, idc, m0rph3us1987, masterzorag, wildcard, x41, zecoxao, zer0xff, z80.