C++ GUI for TegraRcmSmash by rajkosto (Fusée Gelée exploit for Nintendo Switch)
The RCM exploit only works on "unpatched" units, i.e manufactured before July 2018. To check if your Switch is patched, use https://ismyswitchpatched.com/
- Inject payloads
- Manage favorites
- Run Linux on your switch (ShofEL2)
- Mount device as USB mass storage (read/write from/to SD card & NAND partitions, hold power button down for 5sec to exit)
- Dump BIS keys for eMMC content decryption (biskeydump by rajkosto)
- Option - "Auto inject" : automatically inject payload after selection or/and when the Switch is plugged in RCM mode
- Option - Minimize app to tray & tray icon's context menu
- Option - Run app at Windows startup
- Install APX device driver (if needed)
Latest release (Windows)
This UI is Windows-only. For other platforms, you can use :
- Fusée Launcher (GNU/Linux)
- NXBoot (OS X, iOS)
- JTegraNX (Windows, OS X, GNU/Linux)
- NXLoader (Android)
- Web Fusée Launcher (Cross-platform, only works with Chrome)
Please open new issue to report a bug or submit a suggestion.
Install the libusbk dev kit using the setup program, then create an environment variable LIBUSBK_DIR
with the installation path as the value.
- Use memloader v3 to mount eMMC on your computer
- Download and open NxNandManager. Select "File" then "Open drive".
- Select the mounted drive. You can now perform backup/restore operations.
- Rajkosto / TegraRcmSmash (Fusée Launcher reimplementation for Windows), memloader, SD tool, biskeydump
- Kate Temkin / Fusée Launcher
- fail0verflow / ShofEL2 (Boot stack for no-modification, universal code execution and Linux on the Nintendo Switch)
- SciresM / Atmosphere
- CTCaer / Hekate
- Reisyukaku / ReiNX