PS4 JAILBREAK
Instructions

This website is now cached in your PS4 browser. You can disconnect your PS4 from the Internet and, from now on, keep using the jailbreak offline. For quick access, feel free to add a bookmark.
To jailbreak, you need to prepare a USB storage device with the image file "exfathax.img" (external link). Once that is done, have the device within reach and click on a payload. If all goes well, after 20-40 seconds you will see the message "You're all set!", sometimes followed by "There is not enough free system memory". The jailbreak consists of two parts: WebKit exploit ("PSFree") and kernel exploit.

Several messages can appear:
  • "There is not enough free system memory.": It means either the WebKit exploit was not successful or a payload could not be loaded. Press "OK" to try again.
  • "Insert an exfathax USB device.": Connect the prepared USB device and closely follow the displayed instructions.
  • Black screen + "An error has occured in the system software.": The system is probably unstable and should be rebooted.
  • "You're all set!": The jailbreak was successful, and the selected payload has been loaded into memory.
Additional information:
  • Loading a GoldHEN or Mira payload unlocks installed homebrew applications and enables "Debug Settings": Leave the browser and go to "Settings - *Debug Settings - Game - Package Installer" to install homebrew PKG files from the root folder of an exFAT-formatted USB storage device. Do not ever go into "*Debug Settings - System - IDU Mode", or your PS4 will brick!
    Current GoldHEN payloads by default hide the Debug Settings and instead create a GoldHEN icon in the home screen's function area.
  • For GoldHEN's Rest Mode support to work, make sure to enable "Keep Application Suspended" in "Settings - Power Save Settings - See Features Available in Rest Mode".
  • You can send additional payload files from a computer: First, load the "JBC Loader" or "Mira Loader" payload. Then, on your computer, use a Netcat program to send your payload files to the PS4.
  • Some payloads loaded via WebKit exploit continue to run inside the browser window. To leave or reopen the browser while keeping them alive, use the PS button.
  • If GoldHEN 2.x's BinLoader server is activated, most payloads are sent to the server. This website feature only works on hippie68.rf.gd or if the website is self-hosted via HTTP. It will not be available on hippie68.github.io or when using HTTPS. Please take care not to send the same payload twice while the payload is still running.
  • Unplug the exfathax USB device before rebooting. Otherwise, the exploit will be triggered too early.
Changelog
Please report any bugs by creating an issue on GitHub (external link).
General information about the website: README.md (external link).

Settings
Theme







Jailbreak





Miscellaneous




Custom payload chains
Name Payloads*
*To save a new payload list, select multiple payloads below and then press "Save".