A PlayStation 4 4.05 firmware kernel exploit has been recently released online, opening the way for a full jailbreak of the console.
The new 4.05 kernel exploit, which can be downloaded from GitHub, allows users to run arbitrary code as kernel. This release, however, doesn't contain any code related to defeating anti-piracy mechanics or running homebrew.
In this project you will find a full implementation of the "namedobj" kernel exploit for the PlayStation 4 on 4.05. It will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. This release however, does not contain any code related to defeating anti-piracy mechanisms or running homebrew. This exploit does include a loader that listens for payloads on port 9020 and will execute them upon receival.
You can find fail0verflow's original write-up on the bug here, you can find my technical write-up which dives more into implementation specifics here (this is still in progress and will be published within the next few days).
This exploit is actually incredibly stable at around 95% in my tests.
WebKit very rarely crashes and the same is true with kernel.I've built in a patch so the kernel exploit will only run once on the system.
You can still make additional patches via payloads
.A custom syscall is added (#11) to execute any RWX memory in kernel mode, this can be used to execute payloads that want to do fun things like jailbreaking and patching the kernel
.An SDK is not provided in this release, however a barebones one to get started with may be released at a later date
.I've released a sample payload here that will make the necessary patches to access the debug menu of the system via settings, jailbreaks, and escapes the sandbox.
Additional information can be found on GitHub.