Jump to content

Pokémon Yellow C109 ID 0x0F arbitrary code execution: Difference between revisions

 
(2 intermediate revisions by the same user not shown)
Line 20:
 
==Expanded party method==
The exploit can also be done by swapping a Pokémon into Pokémon 91 in the [[expanded inventoryparty]].
 
Typically, the swapped Pokémon's lower Defense byte would determine E109 (Echo RAM of C109), but in actuality there are complications such as the lower Defense being overwritten before the swap occurs. Practically, the following setup should work:
Line 32:
 
==Attribution==
*Torchickens/ChickasaurusGL (textdocumentation fromof YouTubearbitrary videocode execution for 0x0F and steps)
*[https://archives.glitchcity.info/forums/board-115/thread-7930/page-1.html jfb1337 - Searches for jp hl in the disassembly projects, which lead to C109 arbitrary code execution as a concept, and its discovery]
 
==YouTube video==
Cookies help us deliver our services. By using our services, you agree to our use of cookies.