Run kexp as the payload after an existing userland jailbreak primitive on a console
Build a host program that maps a writable executable region and loads kexp into it
Pass pipe descriptors, an allproc pointer, and an ELF loader address to the payload
Study the integration recipe as a reference for post-exploit payload loading
Repo has no build steps or target platform listed, and assumes a prior userland jailbreak primitive.
This repository, called kexp, is described in one line by the author as a payload that does post-jailbreak related work. Jailbreak in this context means an exploit that already broke through a device's normal restrictions, and a payload is the chunk of code that runs once that opening has been made. The repository itself is small and the README is sparse: there is no architecture overview, no build instructions, no license, and no statement of which platform it targets. What the README does contain is an 11-step recipe for a host program that loads kexp into a running process and runs it on a separate thread. The steps assume that a jailbreak has already happened from a userland process. The host first creates a shared memory region that is allowed to be both writable and executable, maps it into its own address space, and copies the kexp machine code bytes into that region. The host then prepares a 40-byte argument structure for the payload. The fields are two pairs of pipe file descriptors labelled master and victim, a kernel pointer labelled allproc, and the address and size of an ELF loader. The host calls pthread_create with the mapped code as the entry point and the argument structure as input, then waits with pthread_join, prints the return value, and frees the result. The README closes with a short credits list of names from the console exploitation community. No further documentation is shown. For a non-technical reader, the practical takeaway is that this repository is not an end-user application but a low-level building block used by other security researchers. The payload itself is written in C and compiled to raw machine code that gets injected into a target process at runtime. The names and field labels in the integration recipe, such as allproc and ELF loader, are conventions used in research into game console operating systems, but the README never names a specific console or firmware version. Anyone trying to actually use the code would need to find that context elsewhere, supply their own jailbreak primitive to reach a userland process with the right capabilities, and build the host program described in the steps.
Generated 2026-05-22 · Model: sonnet-4-6 · Verify against the repo before relying on details.