The following homebrew exploits can be executed on a previously un-exploited system.
+
The following homebrew exploits can be executed on a previously un-exploited system. ''Please'' see the above Payload section regarding what "Supported firmwares" indicates ''exactly''.
{| class="wikitable" border="1"
{| class="wikitable" border="1"
Line 81:
Line 81:
==Secondary Exploits==
==Secondary Exploits==
−
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own.
+
Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. ''Please'' see the above Payload section regarding what "Supported firmwares" indicates ''exactly''.