Jump to content

PS4 Playground 1.0.0

¿Quieres enterarte al momento de las nuevas descargas? Síguenos en Twitter, Mastodon o Threads!

A collection of PS4 tools and experiments using the WebKit exploit. This is for firmware 1.76 only at the moment.

Although initially just a framework to help write and execute ROP chains, the playground now allows for running unsigned binaries compiled with the PS4 SDK, and booting Linux from USB.


You should clone the repo and upload it your own server if you wish to make changes:

git clone git://github.com/CTurt/PS4-playground.git


After executing a test, you should either refresh the page, or close and reopen the browser entirely; running multiple experiments sequentially is not reliable. If you are using a web browser view in an app which isn't the Internet Browser, you can use the Refresh button under Misc to refresh the page.

Code Execution

Click "Go", and wait for the text "Stage: Waiting for payload..." to appear.

Send the desired binary over TCP to your PS4 on port 9023; you can use any standard networking tool to do this, or my custom Windows tool, WiFi-Loader

If you're on Linux, the easiest way is probably to use netcat:

nc -w 3 9023 < *.bin

After you have sent the binary, it will be executed automatically.

Linux loader

You need a FAT32 formatted USB drive plugged in on any PS4's USB port with the following files on the root directory:

bzImage : Kernel image that will be loaded. Recommended to use this sources to compile it.

initramfs.cpio.gz : The initial file system that gets loaded into memory during the Linux startup process. This one is recommended.

The file names must match with the above and you can have more files on the same USB drive. From there you can setup the environment to run from an NFS share or from an external drive via USB (recommended) and boot a complete distro!


Get PID - Get process ID

Get Login - Get login name and leak a kernel pointer


Get Loaded Modules - Get a list of currently loaded modules, index and ID

Dump Loaded Module - Dump a currently loaded module (use Get Loaded Modules to see all available)

Load Module - Load an additional module from this list

Once you have loaded a module, refresh the page, and you will be able to dump it.


Browse - File Browser

Get PSN username - Read your PSN username from account.dat

Get Sandbox Directory - Get the name of the current sandbox directory (10 random characters which change each reboot)


Get Stack Protection - Get stack base, size, and protection

Get Stack Name - Get stack base, size, and name


Send Message - Send a TCP message to the specified IP and port

Receiving data

File and memory dumps will be sent over TCP to the IP and port you specified.

You can use a simple tool like TCP-Dump to write the data to a file.

by Cturt.

No te pierdas nada, síguenos en Twitter, Mastodon o Threads!
Preguntas, aportes y peticiones en el foro.

  • Crear nuevo...