PS Vita, one year later: What hacks do we have right now?

February 22, 2013

What hacks do we have for the Playstation Vita right now?? Well, I’m gonna sum it all up for you.

The Playstation Vita (Formerly known as the NGP) is a handheld game console manufactured and marketed by Sony Computer Entertainment. It is the successor to the Playstation Portable. It was released in Japan and many parts of Asia on December 17th 2011, and in the rest of the world about a year ago. The Playstation Vita includes 2 analog sticks, a beautiful 5 inch OLED touch screen, Wi-fi, Bluetooth and optional 3G.


VHBL (Vita Half Byte Loader) is a homebrew Loader for the Playstation Vita running within the PSP emulator. It allows you to play fanmade games and emulators on the PS Vita. It has access to the usermode part of the PSP game and only allows to play homebrew. It does not allow you to play backups.

CEF and ARK(Kernel)

This is the second level in exploits and allows the usage of backups as well as homebrew, still in the psp emulator. It is the highest access exploit available to the public right now.There are various versions of  it made by Total_Noob and the Pro team.

  • CEF TN 6.60
  1. TN A
  2. TN B
  3. TN C
  4. TN V (In development)
  • ARK

ARK can be found here. There are also various menus developed for TN A, B, and C. they are :-

Vita Usermode

Here, we are out of the sandboxed PSP emulator. The people who are currently known to have this are yifan_lu and SKFU, and their work is not public yet (at least not in a shape usable by the end user). But when the time comes, there will be HUGE possibilities for the Vita’s system and we will be able to get more out of it.

Currently there is only one known kernel exploit on 2.05 and 2 usermode exploits, which haven’t been released yet. The UNO exploit on 2.02 could potentially be the last public one. Read about it here.
Well, There you have it! all that we have for the Vita right now!! Will we have full kernel access to the Vita??
Only time will tell…..

Tweet this!Tweet this!

Previous post:

Next post: