Luac0re is a mast1c0re variation that uses Lua scripting for easier exploit development.
- The original mast1c0re for Okage uses PS2 code execution only, which requires the PS2SDK to compile the code.
- Luac0re uses minimal PS2 shellcode to escape ps2emu, then leverages the Lua 5.3 interpreter already embedded in the main executable (originally intended for ps2emu configuration) to simplify code writing and execution.
- Starting from version 2.0, a JIT compiler exploit has been added, enabling arbitrary native userland code execution on the latest PS4/PS5 firmwares without requiring a kernel exploit.
- Additionally, non AF_UNIX domain socket creation restriction introduced in PS5 firmware 8.00 can now be bypassed using the JIT exploit.
- PS4 or PS5 console
- Disc or digital version of Star Wars Racer Revenge USA (CUSA03474) or EU (CUSA03492) region
- Poopsploit payload requires 12.00 or lower firmware PS5
- Download the latest release ZIP file and extract it
- The included savedata has been modified to allow a larger savedata image, as the original was too small to fit all the required files.
- As a result, existing savedata image cannot be used — resigning the included savedata is mandatory.
- For resigning the savedata, refer to the remote_lua_loader SETUP guide
- Start the game and go to "OPTIONS -> HALL OF FAME"
- Enjoy
- CTurt - mast1c0re writeup
- McCaulay - mast1c0re writeup and Okage reference implementation
- ChampionLeake - PS2 Star Wars Racer Revenge exploit writeup on psdevwiki
- shahrilnet & null_ptr - Code references from remote_lua_loader
- Dr.Yenyen - Testing and validation
- TheFlow - Original netcontrol kernel exploit
- egycnq - Porting netcontrol kernel exploit to Luac0re
This tool is provided as-is for research and development purposes only.
Use at your own risk.
The developers are not responsible for any damage, data loss, or other consequences resulting from the use of this software.