It looks like this might be a goer having just done a xbedump -da.
It works on all regions, it is signed for the HDD, and it hasn't got the CRC32s of the two .IN files internally so it means the exploit people can modify those files. Looking in it via hex, the file uses z:\BUFFER.IN and z:\FFT.IN.
Only one flaw with this is that every time you run a game, the Z drive is deleted, so you might have to reinstall the exploit every time...
Either way, it's VERY intresting. Cheers Yod@
