A new PSGroove update surfaced late this afternoon!
This time it's from AerialX twitter. --- (AerialX, was the one running the DNS PSN bypass!)
Sourcecode available on: GitHubQuote:
This fork comes with multiple payloads, which you can enable by editing port1_config_descriptor.S .
All payloads have been rearranged so that they do not use hardcoded addresses anymore;
you can rewrite and resize functions without worrying about offsetting others.
The default payload performs the basic PSGroove exploit; it allows you to install and run unsigned packages.
This payload makes use of the /app\_home/PS3\_GAME menu item.
You may place an application on a USB drive under the PS3\_GAME folder to run it without installing a package.
That simply extracting a .pkg onto the USB drive is not quite enough for a program to run.
EBOOT.BIN must be slightly modified to boot properly.