{"id":36902,"date":"2025-03-07T11:13:04","date_gmt":"2025-03-07T11:13:04","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=36902"},"modified":"2025-03-07T11:13:05","modified_gmt":"2025-03-07T11:13:05","slug":"unleashed-recompiled","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/","title":{"rendered":"Unleashed Recompiled : A Technical Deep Dive Into Sonic&#8217;s PC Transformation"},"content":{"rendered":"\n<p>Unleashed Recompiled is an unofficial PC port of Sonic Unleashed, created through the process of static recompilation. <\/p>\n\n\n\n<p>This innovative project leverages advanced tools like <strong>XenonRecomp<\/strong> and <strong>XenosRecomp<\/strong> to convert the original Xbox 360 PowerPC code and Xenos shaders into C++ and HLSL code, enabling compatibility with modern PC hardware. <\/p>\n\n\n\n<p>Below is an overview of the tools and their functions within the project.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Tools Used<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>XenonRecomp<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Converts PowerPC executables from the Xbox 360 into x86-compatible<a href=\"https:\/\/github.com\/hedge-dev\/UnleashedRecomp\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> C++ code<\/a>.<\/li>\n\n\n\n<li>Inspired by similar projects like <em>N64: Recompiled<\/em>, this tool ensures that the original game logic can run seamlessly on PC platforms1<a href=\"https:\/\/twistedvoxel.com\/modders-created-tool-to-recompile-xbox-360-games-to-native-pc-ports-sonic-unleashed\/\" target=\"_blank\" rel=\"noreferrer noopener\">4<\/a>.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>XenosRecomp<\/strong>:\n<ul class=\"wp-block-list\">\n<li>Translates Xenos GPU shaders into HLSL (High-Level Shader Language), which is compatible with modern graphics APIs like DirectX and Vulkan1<a href=\"https:\/\/github.com\/hedge-dev\/UnleashedRecomp\/blob\/main\/README.md\" target=\"_blank\" rel=\"noreferrer noopener\">5<\/a>.<\/li>\n\n\n\n<li>This enables accurate rendering of graphics while optimizing performance for contemporary hardware.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Enhanced Features Enabled By These Tools<\/strong><\/h2>\n\n\n\n<p>The recompilation process delivers numerous enhancements, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>High Resolutions &amp; Ultrawide Support<\/strong>: Players can enjoy visuals up to 4K resolution and ultrawide aspect ratios, improving immersion.<\/li>\n\n\n\n<li><strong>Improved Performance<\/strong>: A new renderer optimizes draw calls for modern APIs, reducing overhead and boosting efficiency. Multi-threading further enhances performance on systems ranging from high-end to lower-end hardware.<\/li>\n\n\n\n<li><strong>Unlocked Frame Rates<\/strong>: The game supports frame rates beyond the original 30 FPS cap, with fixes for glitches at higher rates, making gameplay smoother.<\/li>\n\n\n\n<li><strong>Modding Support<\/strong>: Compatibility with Hedge Mod Manager allows users to customize their experience through mods, ensuring flexibility for creative additions.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Additional Quality-of-Life Features<\/strong><\/h2>\n\n\n\n<p>The port includes modern conveniences such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Customizable graphical options (anti-aliasing, texture filtering).<\/li>\n\n\n\n<li>Achievements integrated into gameplay.<\/li>\n\n\n\n<li>Localization in multiple languages.<\/li>\n\n\n\n<li>Controller enhancements like support for DualShock\/DualSense LEDs and touchpads.<\/li>\n<\/ul>\n\n\n\n<p>These tools not only bring <em>Sonic Unleashed<\/em> to PC but also pave the way for recompiling other Xbox 360 titles. <\/p>\n\n\n\n<p>By bypassing emulation overhead, they offer native PC performance, opening doors for modding and preserving gaming history. <\/p>\n\n\n\n<p>This project exemplifies how fan-driven innovation can transform legacy games into modern masterpieces.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unleashed Recompiled is an unofficial PC port of Sonic Unleashed, created through the process of static recompilation. This innovative project leverages advanced tools like XenonRecomp and XenosRecomp to convert the original Xbox 360 PowerPC code and Xenos shaders into C++ and HLSL code, enabling compatibility with modern PC hardware. Below is an overview of the [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":36910,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[38,41],"tags":[737,6321,6052,6325],"class_list":["post-36902","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software","category-tuts","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unleashed Recompiled : A Technical Deep Dive Into Sonic&#039;s PC<\/title>\n<meta name=\"description\" content=\"Unleashed Recompiled&quot; is an unofficial PC port of Sonic Unleashed, created through the process of static recompilation. This innovative\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unleashed Recompiled : A Technical Deep Dive Into Sonic&#039;s PC\" \/>\n<meta property=\"og:description\" content=\"Unleashed Recompiled&quot; is an unofficial PC port of Sonic Unleashed, created through the process of static recompilation. This innovative\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-07T11:13:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-07T11:13:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Unleashed Recompiled : A Technical Deep Dive Into Sonic&#8217;s PC Transformation\",\"datePublished\":\"2025-03-07T11:13:04+00:00\",\"dateModified\":\"2025-03-07T11:13:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/\"},\"wordCount\":327,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"software\",\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/\",\"name\":\"Unleashed Recompiled : A Technical Deep Dive Into Sonic's PC\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp\",\"datePublished\":\"2025-03-07T11:13:04+00:00\",\"dateModified\":\"2025-03-07T11:13:05+00:00\",\"description\":\"Unleashed Recompiled\\\" is an unofficial PC port of Sonic Unleashed, created through the process of static recompilation. This innovative\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp\",\"width\":1600,\"height\":900},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unleashed Recompiled : A Technical Deep Dive Into Sonic's PC","description":"Unleashed Recompiled\" is an unofficial PC port of Sonic Unleashed, created through the process of static recompilation. This innovative","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/","og_locale":"en_US","og_type":"article","og_title":"Unleashed Recompiled : A Technical Deep Dive Into Sonic's PC","og_description":"Unleashed Recompiled\" is an unofficial PC port of Sonic Unleashed, created through the process of static recompilation. This innovative","og_url":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-03-07T11:13:04+00:00","article_modified_time":"2025-03-07T11:13:05+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp","type":"image\/webp"}],"author":"Varshini","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Unleashed Recompiled : A Technical Deep Dive Into Sonic&#8217;s PC Transformation","datePublished":"2025-03-07T11:13:04+00:00","dateModified":"2025-03-07T11:13:05+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/"},"wordCount":327,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["software","Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/","url":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/","name":"Unleashed Recompiled : A Technical Deep Dive Into Sonic's PC","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp","datePublished":"2025-03-07T11:13:04+00:00","dateModified":"2025-03-07T11:13:05+00:00","description":"Unleashed Recompiled\" is an unofficial PC port of Sonic Unleashed, created through the process of static recompilation. This innovative","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/unleashed-recompiled\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp","width":1600,"height":900},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Unleashed-Recompiled.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36908,"url":"https:\/\/kalilinuxtutorials.com\/xenonrecomp\/","url_meta":{"origin":36902,"position":0},"title":"XenonRecomp : A Tool For Recompiling Xbox 360 Executables","author":"Varshini","date":"March 7, 2025","format":false,"excerpt":"XenonRecomp is a powerful tool designed to convert Xbox 360 executables into C++ code, allowing these executables to be recompiled for various platforms. Currently, it supports x86 platforms due to its reliance on x86 intrinsics. This project draws inspiration from similar tools like N64: Recompiled, which serves the same purpose\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/XenonRecomp-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/XenonRecomp-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/XenonRecomp-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/XenonRecomp-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/XenonRecomp-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/XenonRecomp-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34628,"url":"https:\/\/kalilinuxtutorials.com\/collateral-damage\/","url_meta":{"origin":36902,"position":1},"title":"Collateral Damage &#8211; Unveiling The Xbox Kernel Exploit","author":"Varshini","date":"August 28, 2024","format":false,"excerpt":"Collateral Damage is a kernel exploit for Xbox SystemOS using\u00a0CVE-2024-30088. It targets Xbox One and Xbox Series consoles running kernel versions 25398.4478, 25398.4908, and 25398.4909. The initial entrypoint is via the Game Script UWP application. The first stage payloads, PE loader and network loader are provided by\u00a0Solstice. This exploit was\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc84R-h7lvUxjWyr9uVGdFVu74G3_S0tElC4s4evNQvOJChKHpiuQV1W38_ud3XGlqXQCi_e5xNzTqkL2czhGmnKpsmely5dPM6mJzuJCXew2WMyVJLRx3c0rra3WWQ4Z4geNwtnLTWqQO8gER74Lo4fvnhfbyrSJzEFAhVmiZwowihOa6rN1mXaTSPjLs\/s16000\/Collateral%20Damage.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":38580,"url":"https:\/\/kalilinuxtutorials.com\/microsoft-unveils-project-helix-a-next-gen-xbox-merging-console-and-pc-gaming\/","url_meta":{"origin":36902,"position":2},"title":"Microsoft Unveils &#8220;Project Helix&#8221;- A Next-Gen Xbox Merging Console and PC Gaming","author":"0xSnow","date":"March 6, 2026","format":false,"excerpt":"Microsoft has officially unveiled its latest gaming venture, Project Helix, a next-generation gaming console set to bridge the gap between console and PC gaming. This revolutionary move could change the way gamers think about platforms and could lead to the most significant shift in the gaming ecosystem in years. What\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/kalilinuxtutorials.com\/category\/news\/"},"img":{"alt_text":"project helix","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_KrPJbMo6EgxBNfentxCNh-4BHa9YvdhMlG5CRh5Do9_i82ub4vgirRn1jtXsqEAxKAbWy3KT6loPGz4ugFmbC-PwLS110K6VdKTUZZ950neW0jcw4N1-KLUmy_Aj60l6FtGkqO1I1eUtM5DsS0AXyteQzxGzqlpBrNZovp8BDc8eynGm2KfQ8TXDYOg\/s1536\/project%20helix.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_KrPJbMo6EgxBNfentxCNh-4BHa9YvdhMlG5CRh5Do9_i82ub4vgirRn1jtXsqEAxKAbWy3KT6loPGz4ugFmbC-PwLS110K6VdKTUZZ950neW0jcw4N1-KLUmy_Aj60l6FtGkqO1I1eUtM5DsS0AXyteQzxGzqlpBrNZovp8BDc8eynGm2KfQ8TXDYOg\/s1536\/project%20helix.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_KrPJbMo6EgxBNfentxCNh-4BHa9YvdhMlG5CRh5Do9_i82ub4vgirRn1jtXsqEAxKAbWy3KT6loPGz4ugFmbC-PwLS110K6VdKTUZZ950neW0jcw4N1-KLUmy_Aj60l6FtGkqO1I1eUtM5DsS0AXyteQzxGzqlpBrNZovp8BDc8eynGm2KfQ8TXDYOg\/s1536\/project%20helix.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_KrPJbMo6EgxBNfentxCNh-4BHa9YvdhMlG5CRh5Do9_i82ub4vgirRn1jtXsqEAxKAbWy3KT6loPGz4ugFmbC-PwLS110K6VdKTUZZ950neW0jcw4N1-KLUmy_Aj60l6FtGkqO1I1eUtM5DsS0AXyteQzxGzqlpBrNZovp8BDc8eynGm2KfQ8TXDYOg\/s1536\/project%20helix.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_KrPJbMo6EgxBNfentxCNh-4BHa9YvdhMlG5CRh5Do9_i82ub4vgirRn1jtXsqEAxKAbWy3KT6loPGz4ugFmbC-PwLS110K6VdKTUZZ950neW0jcw4N1-KLUmy_Aj60l6FtGkqO1I1eUtM5DsS0AXyteQzxGzqlpBrNZovp8BDc8eynGm2KfQ8TXDYOg\/s1536\/project%20helix.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_KrPJbMo6EgxBNfentxCNh-4BHa9YvdhMlG5CRh5Do9_i82ub4vgirRn1jtXsqEAxKAbWy3KT6loPGz4ugFmbC-PwLS110K6VdKTUZZ950neW0jcw4N1-KLUmy_Aj60l6FtGkqO1I1eUtM5DsS0AXyteQzxGzqlpBrNZovp8BDc8eynGm2KfQ8TXDYOg\/s1536\/project%20helix.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":21884,"url":"https:\/\/kalilinuxtutorials.com\/umay\/","url_meta":{"origin":36902,"position":3},"title":"Umay : IoT Malware Similarity Analysis Platform","author":"R K","date":"February 17, 2022","format":false,"excerpt":"Umay project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have shared code with the analyzed file. In this way, you can have a chance to get an idea about the family of the malware. There are various devices with different architectures\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEijJDX23RCOH42WEHiDitXyVud9F3AZJ4w9I5XOUN1BS7_Zpt74AAGaf3xrfAy4mZ4NSaoRdJAamzR8KkZHdLCMvKLLL5I9dbtE20u1DqJpMjtRHHc6g7e1oxbEqEczHeCyF6X7Z5MbCbKOOHeOjRY5nqFZ8RvPGcKkl2PX5cJD1dohaaC0z3jxPJJK=s847 2x"},"classes":[]},{"id":29876,"url":"https:\/\/kalilinuxtutorials.com\/prebuilt-multi-arch-binaries\/","url_meta":{"origin":36902,"position":4},"title":"Prebuilt Multi-Arch Binaries for Enhanced Device Management","author":"Varshini","date":"August 31, 2023","format":false,"excerpt":"Prebuilt binaries for multiple architeture (arm, armeb, aarch64, aarch64_be, mips, mips1, mipsel, mipsel1, mips64, mips64el, powerpc, powerpc64, powerpc64le, riscv64, i586, x86_64) All binaries are statically linked and stripped. Please go to the\u00a0Release\u00a0page for downloads.\u00a0*archName*_tools.zip\u00a0contains tools' binary (see Tools Section) for that specific arch, and\u00a0allinone.zip\u00a0contains all of it. Or download single\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg1DYQmEfUcgWMinYm8fspv3cxjm386wkTjT-6m7h24qtsO0NyWLYSz-n2S97hyGv0qQhH0RddIf85V03BQfPZXtLh2siy9wy4McbRQ4ISJOo9kCCQ9GDcow7oyLsV54KZqZTysDYeAaoB9dGwDAunS2chhxzbXHqg98CFaiv0GXwh1JRVZt5pZYPStpQ\/s16000\/Prebuilt%20Multi-Arch%20Binaries%20for%20Enhanced%20Device%20Management.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg1DYQmEfUcgWMinYm8fspv3cxjm386wkTjT-6m7h24qtsO0NyWLYSz-n2S97hyGv0qQhH0RddIf85V03BQfPZXtLh2siy9wy4McbRQ4ISJOo9kCCQ9GDcow7oyLsV54KZqZTysDYeAaoB9dGwDAunS2chhxzbXHqg98CFaiv0GXwh1JRVZt5pZYPStpQ\/s16000\/Prebuilt%20Multi-Arch%20Binaries%20for%20Enhanced%20Device%20Management.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg1DYQmEfUcgWMinYm8fspv3cxjm386wkTjT-6m7h24qtsO0NyWLYSz-n2S97hyGv0qQhH0RddIf85V03BQfPZXtLh2siy9wy4McbRQ4ISJOo9kCCQ9GDcow7oyLsV54KZqZTysDYeAaoB9dGwDAunS2chhxzbXHqg98CFaiv0GXwh1JRVZt5pZYPStpQ\/s16000\/Prebuilt%20Multi-Arch%20Binaries%20for%20Enhanced%20Device%20Management.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg1DYQmEfUcgWMinYm8fspv3cxjm386wkTjT-6m7h24qtsO0NyWLYSz-n2S97hyGv0qQhH0RddIf85V03BQfPZXtLh2siy9wy4McbRQ4ISJOo9kCCQ9GDcow7oyLsV54KZqZTysDYeAaoB9dGwDAunS2chhxzbXHqg98CFaiv0GXwh1JRVZt5pZYPStpQ\/s16000\/Prebuilt%20Multi-Arch%20Binaries%20for%20Enhanced%20Device%20Management.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":36799,"url":"https:\/\/kalilinuxtutorials.com\/spice86\/","url_meta":{"origin":36902,"position":5},"title":"Spice86 &#8211; A PC Emulator For Real Mode Reverse Engineering","author":"Varshini","date":"March 3, 2025","format":false,"excerpt":"Spice86 is an advanced PC emulator designed for reverse engineering and rewriting real-mode DOS programs, especially when the source code is unavailable. Built on .NET 8, it is compatible with Windows, macOS, and Linux, offering a robust platform for developers and researchers to dissect and reimplement legacy software. Below is\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=36902"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36902\/revisions"}],"predecessor-version":[{"id":36909,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36902\/revisions\/36909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/36910"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=36902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=36902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=36902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}