User contributions
2 October 2015
30 September 2015
29 September 2015
Hardware
Common hardware
-3
CONFIG11 Registers
PDN_MPCORE_CLKCNT
+166
CONFIG11 Registers
PDN_MPCORE_CLKCNT
+53
CONFIG11 Registers
PDN_MPCORE_CLKCNT
+116
CONFIG11 Registers
PDN_MPCORE_CLKCNT
+58
CONFIG11 Registers
PDN_MPCORE_CLKCNT
+64
CONFIG11 Registers
PDN_MPCORE_CLKCNT
+104
CONFIG11 Registers
PDN_MPCORE_CLKCNT
+28
CONFIG11 Registers
no edit summary
+124
CONFIG11 Registers
PDN_MPCORE_STATUS
+882
Hardware
Common hardware
+259
Hardware
Common hardware
+170
28 September 2015
Memory layout
0x17E10000
+521
SVC
KernelSetState
+141
SVC
KernelSetState
+206
SVC
KernelSetState
+338
Memory layout
0x17E10000
+87
Memory layout
ARM11 Physical memory regions
+239
APT:GetAppletProgramInfo
Response
+22
Browserhax
no edit summary
-1
NCCH/Extended Header
Flag1
+351
Hardware
Common hardware
+11
Hardware
Common hardware
+213
CONFIG11 Registers
PDN_MPCORE_STATUS
+49
SVC
KernelSetState
+235
27 September 2015
NCCH/Extended Header
Flag1
+126
PTMSYSM:ConfigureNew3DSCPU
Description
+129
PTMSYSM:ConfigureNew3DSCPU
Created page with "=Request= {| class="wikitable" border="1" |- ! Index Word ! Description |- | 0 | Header code [0x08180040] |- | 1 | u8 value |} =Response= {| class="wikitable" border="1" |- ! ..."
PTM Services
SysMenu PTM Service "ptm:sysm"
+54
SVC
KernelSetState
-16
Homebrew Exploits
Exploits without Homebrew Launcher (Not recommended)
+26
PMApp:GetTitleExheaderFlags
no edit summary
+164
NCCH/Extended Header
Flag1 and Flag2: (field names are from the recent Project_CTR pull-request merge)
+267
NSS:LaunchTitle
Description
+95
26 September 2015
Homebrew Exploits
Standalone Homebrew Launcher Exploits
+45
Process Manager Services
Process Manager app service "pm:app"
+199
APT:SetApplicationCpuTimeLimit
Description
+66
News
News
+95
Homebrew Exploits
Standalone Homebrew Launcher Exploits
+59
25 September 2015
3DS Userland Flaws
System applets
+1,124
Browserhax
Created page with "The following browser exploits can be used to boot the hblauncher payload: * [https://github.com/yellows8/3ds_webkithax] * [https://github.com/yellows8/browserhax_fright] A host..."
Menuhax
Created page with "This is a Home Menu theme exploit with SD card data which automatically triggers during system boot, see [https://github.com/yellows8/3ds_homemenuhax here] for details."
FirmwareNews
no edit summary
+153
Homebrew Exploits
Secondary Exploits
-24
Homebrew Exploits
no edit summary
+580
News/Archive
no edit summary
+227
News
News
-47