I have a question, How are these exploits written? I heard somewhere that they are coded in MIPS assembly (oohh, nice low level language). but then what, do they just turn it into an 8x8 black inmage in MS paint?
If somebody could clear it up for me on exactly how these images are compiled/created then that would fab didly ab for me.
Thanks for reading