CTurt, kR105, flatz, SKFU, droogie, Xerpi, Hunger, Takezo, nas, Proxima, Fx0day, Hitodama

A collection of PS4 tools and experiments using the WebKit exploit. This is for firmware 1.76 only at the moment.

Code Execution

Click "Start", and wait for the text "Stage: Waiting for payload..."
to appear. You can use netcat: nc -w 3 192.168.xxx.xxx 9023 < *.bin

Stage: [Not started]

Linux Kernel Loader

Make sure to have files initramfs.cpio.gz and bzImage on a FAT32
formatted USB drive connected to the PS4 before loading this

FTP Server + Debug Settings

Once enabled you will be able to connect on your PS4 using Port 1337
(User/Password are not checked) and this will unlock Debug Settings


Once you have loaded a module, refresh the page,
and you will be able to dump it

Loaded Module ID:

Loaded Module Index:

Module ID (check this list):

Module name (check this list):


- File Browser



Lite Version 2.00.00

Base Version by CTurt
Modified by Fx0day
Edit by eXtreme
After executing a test, you should either refresh the page, or close and reopen the browser entirely; running multiple experiments sequentially is not reliable. If you are using a web browser view in an app which isn't the Internet Browser, you can use the Refresh button under Misc to refresh the page.
File and memory dumps will be sent over TCP to the IP and port you specified. You can use a simple tool like TCP-Dump to write the data to a file.