
goldHEN running via PPPwn (Firmware 9.00) – screenshot by Dravszoo
The scene is updating tools and features at the speed of light for the recently released PS4 11.00 Jailbreak, PPPwn. It’s now become possible to run PPPwn from a lot of third party devices to make it more convenient to Jailbreak your PS4, without the need of a computer. You can now Jailbreak your PS4 with a Raspberry Pi, or even your TV or your router, eliminating the need to have a computer connected to the PS4 every single time.
PI-Pwn (Raspberry Pi version) updated with lots of features. The best way to run PPPwn IMO

pi-pwn (screenshot by Modded Warfare)
The Raspberry Pi version of PPPwn is getting significant updates since its initial release. Specifically, we’re seeing these major updates to the tool, and if you’ve been using the Raspberry Pi as your way to Jailbreak the PS4 with PPPwn, it is strongly advised you update to the latest Pi-Pwn version:
- The C++ port of PPPwn is now the default version for Raspberry Pi. This port can be 5 to 10 times faster than the original Python scripts, depending on your circumstances. This alone is life changing compared to the original release
- Payload support: you can now load Payloads from the raspberry Pi into the PS4
- Stogged has provided a Web server and a web interface to his release, which lets you control your raspberry Pi from a phone on the local network, or from the PS4 itself. It lets you restart the server, re-launch the exploit, Load a Payload from the Raspberry Pi USB and inject it into the PS4, etc…
Stooged is really trying to provide us with a fully automated solution here, and to me this is possibly the best option out there for this exploit, if you have a Raspberry Pi lying around, or plan to purchase one. The Raspberry Pi can also give the PS4 internet access via PPPoE itself, so it’s the best of all worlds. Here’s what the developer says:
Once everything is setup and the ethernet cable is plugged in between the pi and the console the pi should automatically try and pwn the console.
The exploit may fail many times but the pi will continue to purge the console to keep trying to pwn itself.
Once pwned the process will stop and the pi will shut down if you are not using internet access.You will need to restart the pi if you wish to pwn the console again.
The idea is you boot the console and the pi together and the pi will keep trying to pwn the console without any input from you, just wait on the home screen until the process completes
The C++ port alone means that more Raspberry Pi models are now viable to run the exploit (lower performance ones where out of the picture initially because they took too long to run PPPwn). Stooged says the following Raspberry Pi models are supported:
Raspberry Pi 5
Raspberry Pi 4 Model B
Raspberry Pi 400
Raspberry Pi 3B+
Raspberry Pi 2 Model B
Raspberry Pi Zero 2 W with usb to ethernet adapter
Raspberry Pi Zero W with usb to ethernet adapter
ROCK PI 4C Plus with armbian Image
BIGTREETECH BTT Pi V1.2 with armbian minimal
pcDuino3b with armbian Image
My personal recommendation is the Raspberry Pi 4 Model B, as a good middle ground between cost and performance, and also one that was supported since day one by Stooged. That model can also run the original Python PPPwn release if you ever need to go back to that (lower performance models will have troubles with the slower code). If you’re looking for a cheaper option, the Pi Zero 2 W is probably what you’re looking for (you’ll need a USB to ethernet adapter as well, which brings the cost up, unless you already own either that adapter or the Raspberry Pi)
You can download Pi-Pwn from the project’s github here, follow the instructions to install and run.
PPLGPwn – Running the Exploit from a Jailbroken LG TV
Possibly the most talked-about port for PPPwn so far has been this version which can run directly from the TV. This eliminates entirely the need for a third party device, you only need your TV and the PS4. What’s more, it turns out LG TV are pretty powerful devices, and as such the exploit can run pretty fast on it. People claim that you can exploit the PS4 in under 20 second from boot with this. Since my own PS4 takes roughly 20s to boot in the first place, I’d say this version of the exploit is probably as fast as it gets when it comes to Jailbreaking a PS4, and also as close as it gets to a “Custom Firmware at boot” (even if it technically isn’t).
There used to be two forks of this exploit, the original one from zauceee, and a port from llbranco, each one with its features and benefits. but the two devs have now decided to work together on Zauceee’s port.
Version 1.2, released a couple days ago, now has an option to start the exploit when you turn the TV on, which is probably what most people want to do. You can also specify a specific button of your remote to run the exploit anytime you need. Really neat.
Changelog v1.2 — 16/05/2024
- Added Support for aarch64 TV’s
- New option to select if you want PPLGPwn to start when you turn your TV on (Thanks llbranco for the help!)
Download here: https://github.com/zauceee/PPLGPwn
PPPwnWRT – Running the exploit from a OpenWRT router
Another very convenient way to run the exploit, is running it from your router itself. That device is already connected to your PS4 anyway, so if you have a router and it happens to be running the open source dd-wrt firmware, you might want to try this version.
Modded Warfare has covered the “Jailbreak via router” option in a recent Tweet below. In his video, the router is apparently able to exploit the PS4 in about 25 seconds, which is comparable to other devices running the exploit. He states that he’s not directly using this OpenWRT version though. But it shows that Jailbreaking via a router is a viable option in terms of speed.
The github provides ways to ease the process, including using a router as a dedicated exploit device that could run the exploit automatically. There are ways to trigger the exploit via a web interface as well.
Using an old router to Jailbreak the PS4! pic.twitter.com/IsORtY0nDe
— MODDED WARFARE (@MODDED_WARFARE) May 17, 2024
https://github.com/FalsePhilosopher/PPPwnWRT
Other tools
There are a lot of other ports going on for the PPPwn exploit, which might work better for your use case. Remember that all these tools are simply wrappers around the original work, and basically all use the same underlying exploit. So which one you choose to use should depend on your personal preferences and what hardware you have available, as (in theory) they should all work to exploit your PS4.
A few interesting tools being mentioned here and there:
- PPPwn in Docker – To run the exploit from a Docker install. The developer recommends it in particular for Raspberry Pi
- PPPwn Windows Automated – will “launch the exploit after automatically disabling and then re-enabling the ethernet cable connected to your ps4”. This can be used to run at Windows startup, to run the exploit as soon as you boot your computer. Convenient if the computer is constantly connected to the same Network as the PS4 and is used as the PPPoE connection
The post PS4 PPPwn exploit updates: updates to tools for Raspberry Pi, LG TV, OpenWRT routers, and more. appeared first on Wololo.net.