pOOBs4 PS4 exploit for v9.0 + automatic gold hen
This is just a repacked psOOBs4, as a flask package with the addition of automatic sending of GoldHEN. Some other small changes:
- Some magic numbers have been renamed (never looked at a PS4 bug before, and wanted to know wtf was going on)
- Some additional logging via HTTP requests (not massively useful as can't do a lot in critical section, but useful for kicking off goldenhen send)
All credit to the team behind pOOBs4
- Download Python and install it, ideally 3.10
- Install flask
python3 -m pip install -r requirements.txt
- Run app
python3 app.py
. Might need to run as root to bind to port 1337 - In the command line the IP address to navigate to will be printed e.g
* Running on http://192.168.1.200:1337/ (Press CTRL+C to quit)
- Navigate to port 1337 on that IP on your PS4
- Same as psOOBs4
- GoldHEN should be sent once the server detects success via log messages
- Try again
- If you're not running 9.00, the exploit won't run. You'll need to modify the template to match your version, or just remove the if/endif