cragson

PoC for code execution on a53 used by PS5 on fw 02.00.

25
2
69% credibility
Found Mar 17, 2026 at 25 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
C++
AI Summary

A demonstration tool that temporarily alters a PlayStation 5 firmware display string to prove the ability to run custom code on its auxiliary processor before restoring the original state.

How It Works

1
๐Ÿ‘€ Discover PS5 hack demo

You hear from gaming enthusiasts about a safe test to prove control over a hidden processor inside your PlayStation 5.

2
๐ŸŽฎ Ready your console

Check that your PS5 runs the specific early software version and has the basic unlock for running custom tests.

3
๐Ÿ“ฅ Get the demo files

Download the simple program files shared by the creator for testing on your setup.

4
๐Ÿ”จ Make the test ready

Follow easy steps to prepare the demo program so it works perfectly on your PS5.

5
๐Ÿ“ฑ Send to your PS5

Quickly transfer the prepared test over your home network to the console.

6
๐Ÿš€ Run the test

Start the demo and feel the thrill as it temporarily changes a version message to a fun custom one like 'pwned by cragson'.

โœ… Proof achieved safely

Everything restores automatically, confirming you gained control over the PS5's inner workings without any lasting changes.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 25 to 25 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is a53-code-exec?

This C++ proof-of-concept delivers arbitrary code execution on the PS5's A53 ARM core at EL3 privilege level, targeting firmware 02.00 via the DECI5S protocol over /dev/mp4/dump. It patches a firmware version string to display "pwned by cragson - 33" after discovering physical addresses through page table walks, then restores originals to avoid damage. Developers get a deployable ELF payload that assumes a prior kernel read/write exploit, serving as a poc code example for A53 exec on airborne poc github setups.

Why is it gaining traction?

With 25 stars, it stands out as a rare POC code meaning hypervisor-defeat demo up to fw 5.00, using kernel primitives for safe read/write on A53 without bricking. Unlike generic csrf poc github repos or poc github copilot experiments, it hooks PS5 reverse engineers by triggering real EL3 code exec via a simple GET_CONF command, proving firmware patching in a controlled loop.

Who should use this?

PS5 jailbreak devs on fw 02.00 with kernel exploits need this for A53 access in custom payloads. Firmware reversers testing poc code switching between x86 and ARM EL3, or those building poc codex for console hypervisors, will find it directly applicable after setting PS5_PAYLOAD_SDK and running make.

Verdict

Grab it if you're deep in PS5 fw 02.00 hackingโ€”solid README guides deployment, but 0.7% credibility score and 25 stars signal early PoC maturity with no tests. Risky for production; test on dev consoles only.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.