Search results

Jump to navigation Jump to search
  • '''Nintendo 64 crooked cartridge''' is an infamous hardware exploit for the Nintendo 64 that allows the player to [[glitch]] out the ga [[Category:Hardware exploits]] ...
    896 bytes (123 words) - 14:19, 30 December 2017
  • ...her.png|thumb|right|250px|The "homebrew launcher". Firmware exploits abuse hardware vulnerabilities to allow the user to do many things not endorsed by Nintend ...3DS|Nintendo 3DS]] family systems which allow for many different types of exploits such as homebrew, data injection, accessing services without having to upda ...
    2 KB (290 words) - 12:36, 12 August 2019
  • [[Category:Hardware exploits]] ...
    895 bytes (139 words) - 14:20, 30 December 2017
  • [[Category:Hardware exploits]] ...
    1 KB (207 words) - 23:20, 13 January 2019
  • In order for a computer to represent both a positive or negative number, the hardware may use what is called a '''signed integer'''. The [[experience underflow glitch]] in {{RBY}} and {{GSC}} exploits both the fact that a Pokémon's experience is an unsigned number, and that a ...
    2 KB (269 words) - 21:43, 6 December 2018
  • ...ng on VBA is not enough evidence that it would also happen on the original hardware and in the same ways. Emulators that are accepted by [https://www.speedrun. ...r you are using, and if possible, the difference in behavior from original hardware. ...
    7 KB (1,205 words) - 06:22, 30 May 2022
  • '''Self-referential control character abuse''' refers to any exploits in the Pokémon games where a [[control character]] prints text but refers b ...ter in locked SRAM. However, pfero is skeptical if this would work on real hardware because of difficult to predict open bus behavior. ...
    2 KB (391 words) - 22:40, 12 September 2022
  • ...ad of time, due to underlying quantum effects. However, specially designed hardware is usually needed to utilize those truly random physical processes. Other " ...on the order of 10<sup>-6</sup> second) timings to affect the state of the hardware (possibly in subtle ways, like forcing the V-Blank interrupt to wait for an ...
    8 KB (1,311 words) - 01:59, 17 May 2022
  • ...es of the debugger to inspect the program state at that point, such as the hardware registers, the assembly code around the program counter, and the contents o An easy trick to find potential [[arbitrary code execution]] (ACE) exploits is to set a breakpoint on execution of ''any'' address in the range of $800 ...
    4 KB (748 words) - 00:02, 10 January 2021
  • ...k manipulation|luck manipulation]] can be considered a class of non-glitch exploits, there are aspects of RNG implementation in the Generation III handheld gam ...ethods" by various sources. Three have been confirmed to occur on official hardware. Each has a counterpart that includes the random encounter nature hunt rout ...
    2 KB (371 words) - 09:37, 17 January 2020
  • ...SRAM is ''never'' initialized, then its contents are unpredictable on real hardware, and handled differently by different emulators. ==Exploits== ...
    13 KB (2,150 words) - 07:56, 15 April 2024
  • ...p table will usually cause glitches, possibly [[arbitrary code execution]] exploits. :2. Specifically, a hardware-implemented stack in the CPU. Notably, the instructions <code>call</code> a ...
    12 KB (1,926 words) - 07:35, 23 January 2023
  • ** A hardware interrupt, such as in the [[Professor Oak's lab music glitch]]. ...the interrupted procedure should know not to rely on registers, or (for a hardware interrupt) the interrupting procedure should know to save their values. ...
    23 KB (3,776 words) - 01:41, 22 April 2024
  • {{Outdated|Document new exploits, in particular simpler box name exploits}} These began with exploits such as causing a custom message to be displayed by the Coin Case, [http:// ...
    31 KB (5,498 words) - 00:14, 11 March 2024
  • ...om number generation in {{RBY}} uses the rDIV function, which is stored in hardware and thus makes intentionally landing on a specific value in these games ver [[Category:Non-glitch exploits]] ...
    16 KB (2,658 words) - 23:58, 16 May 2022