Search results
Jump to navigation
Jump to search
- '''Nintendo 64 crooked cartridge''' is an infamous hardware exploit for the Nintendo 64 that allows the player to [[glitch]] out the ga [[Category:Hardware exploits]] ...896 bytes (123 words) - 14:19, 30 December 2017
- ...her.png|thumb|right|250px|The "homebrew launcher". Firmware exploits abuse hardware vulnerabilities to allow the user to do many things not endorsed by Nintend ...3DS|Nintendo 3DS]] family systems which allow for many different types of exploits such as homebrew, data injection, accessing services without having to upda ...2 KB (290 words) - 12:36, 12 August 2019
- [[Category:Hardware exploits]] ...895 bytes (139 words) - 14:20, 30 December 2017
- [[Category:Hardware exploits]] ...1 KB (207 words) - 23:20, 13 January 2019
- In order for a computer to represent both a positive or negative number, the hardware may use what is called a '''signed integer'''. The [[experience underflow glitch]] in {{RBY}} and {{GSC}} exploits both the fact that a Pokémon's experience is an unsigned number, and that a ...2 KB (269 words) - 21:43, 6 December 2018
- ...ng on VBA is not enough evidence that it would also happen on the original hardware and in the same ways. Emulators that are accepted by [https://www.speedrun. ...r you are using, and if possible, the difference in behavior from original hardware. ...7 KB (1,205 words) - 06:22, 30 May 2022
- '''Self-referential control character abuse''' refers to any exploits in the Pokémon games where a [[control character]] prints text but refers b ...ter in locked SRAM. However, pfero is skeptical if this would work on real hardware because of difficult to predict open bus behavior. ...2 KB (391 words) - 22:40, 12 September 2022
- ...ad of time, due to underlying quantum effects. However, specially designed hardware is usually needed to utilize those truly random physical processes. Other " ...on the order of 10<sup>-6</sup> second) timings to affect the state of the hardware (possibly in subtle ways, like forcing the V-Blank interrupt to wait for an ...8 KB (1,311 words) - 01:59, 17 May 2022
- ...es of the debugger to inspect the program state at that point, such as the hardware registers, the assembly code around the program counter, and the contents o An easy trick to find potential [[arbitrary code execution]] (ACE) exploits is to set a breakpoint on execution of ''any'' address in the range of $800 ...4 KB (748 words) - 00:02, 10 January 2021
- ...k manipulation|luck manipulation]] can be considered a class of non-glitch exploits, there are aspects of RNG implementation in the Generation III handheld gam ...ethods" by various sources. Three have been confirmed to occur on official hardware. Each has a counterpart that includes the random encounter nature hunt rout ...2 KB (371 words) - 09:37, 17 January 2020
- ...SRAM is ''never'' initialized, then its contents are unpredictable on real hardware, and handled differently by different emulators. ==Exploits== ...13 KB (2,150 words) - 07:56, 15 April 2024
- ...p table will usually cause glitches, possibly [[arbitrary code execution]] exploits. :2. Specifically, a hardware-implemented stack in the CPU. Notably, the instructions <code>call</code> a ...12 KB (1,926 words) - 07:35, 23 January 2023
- ** A hardware interrupt, such as in the [[Professor Oak's lab music glitch]]. ...the interrupted procedure should know not to rely on registers, or (for a hardware interrupt) the interrupting procedure should know to save their values. ...23 KB (3,776 words) - 01:41, 22 April 2024
- {{Outdated|Document new exploits, in particular simpler box name exploits}} These began with exploits such as causing a custom message to be displayed by the Coin Case, [http:// ...31 KB (5,498 words) - 00:14, 11 March 2024
- ...om number generation in {{RBY}} uses the rDIV function, which is stored in hardware and thus makes intentionally landing on a specific value in these games ver [[Category:Non-glitch exploits]] ...16 KB (2,658 words) - 23:58, 16 May 2022