hexFWhexFW is an attempt to provide a user friendly CFW solution for the Wii U.SummaryThe code in this repository is divided into two main folders:"firmware": IOSU patching framework"launcher": exploit code chain responsible for injecting the patched IOSU imageCurrently, iosuhax (by smealum) is the basis for the firmware patching framework. This project's goal is to build upon smealum's patching system to deliver a fully functional and customizable Wii U CFW. The exploit chain used to inject the firmware's code uses yellows8's wiiu_browserhax_fright and is a direct implementation of two distinct vulnerabilities documented by hykem, naehrwert and plutoo. The exploit is compiled using a stripped down version of the libwiiu project and is triggered from the Wii U's Web Browser.DependenciesCygwin, MinGW or any other unix-like shell (Windows only)devkitPRO (devkitPPC and devkitARM)armips (for assembling ARM patches)Python 2.x or 3.xXAMPP or equivalent for self-hosting (optional)BuildingPlace your retail "fw.img" file (encrypted or decrypted but with the header attached) inside the folder "firmware/img".Copy "armips.exe" into the root of the "firmware" folder.Edit "firmware/scripts/anpack.py" and manually replace the dummy ancast keys with the real ones.Browse back to the main folder ("hexFW") and run "make" from a shell.UsageAfter building the project a new folder "bin" will be created in the root folder ("hexFW") as well as two sub-folders "www" and "sdcard".Copy the "fw.img" file inside "sdcard" into the root of your SD card (FAT32 formatted, preferably).Setup a server (e.g.: localhost:8080) and host the contents of "www". After inserting the SD card (with the firmware image) into the Wii U, browse to "wiiu_browserhax.php" and pass along your target system's version (e.g.: localhost:8080/wiiu_browserhax.php?sysver=550).The launcher will run ("fwboot") and launch the firmware image from the SD card.Creditssmealum - iosuhax project (https://github.com/smealum/iosuhax)yellows8 - wiiu_browserhax_fright exploit (https://github.com/y...wiiuhaxx_common and https://github.com/y...wserhax_fright)hykem, naehrwert and plutoo - IOS-USB bad array index check (uhshax) vulnerability (http://wiiubrew.org/..._.28uhshax.29); IOS_CreateThread unchecked memset vulnerability (http://wiiubrew.org/wiki/Exploits#IOS_CreateThread_unchecked_memset); extensive documentation and research on the Wii Ulibwiiu team - libwiiu framework (https://github.com/wiiudev/libwiiu)