That guide is a traduction of my french topic here : http://www.logic-sunrise.com/forums...ne-ps3-suite-a-un-flash-ps3xploit-malheureux/ That guide is for technicians and advanced users having an hardware flasher. It intended to restore a NOR console under "metldr2" having been accidentally flashed via PS3Xploit (v1 or v2), causing a perma-brick. So for some CECH-25xxx, the CECH-3xxxx and CECH-4xxxx NOR (for the 12GB CECH-4xxxx equipped with EMMC, no public tools are available yet to unbrick them.) Note : for consoles under "metldr" (jailbreak compatible) bricked using PS3Xploit flash writer over a CFW4.82, dump and flash your NOR or NAND applying regular NO-FSM jailbreak method. Case if you previously made a backup with PS3Xploit Dumper: Simply flash the NOR with your "dump.hex" backup file and your hardware flasher. (I will not describe the procedure here. There are a lot of tutorials to use E3 flasher, Teensy or Progskeet for those who don't know yet). !!WARNING!! If you are using an E3 flasher, you must do a byte swap of your dump before to rename it "bkpps3.bin" and to fash it. For that, you can use either FlowRebuilder (http://www.psx-place.com/resources/flow-rebuilder.524/) with the "Byte reverse a dump" operation, or PyPS3patcher (https://github.com/littlebalup/PyPS3tools/tree/master/PyPS3patcher) with the "swap" command. Case if you have not previously done a backup with PS3Xploit Dumper: 1- Dump the NOR with your hardware flasher (I will not describe the dump/flash procedure here. There are a lot of tutorials to use E3 flasher, Teensy or Progskeet for those who don't know yet). In that guide I assume the dumps have been done correctly. I highly recommend to use PyPS3checker (https://github.com/littlebalup/PyPS3tools) to check your dump before before going further. Your dump should be good exept a warning on the SKU and maybe one on ROS hash. Ask if you have any doubt. 2- Download that *.bin file: https://www.dropbox.com/s/ph0gvbh8jljgwk2/CosOFW482.BIN?dl=1 MD5: DBCE1CCF7E8A64DC2A6C7019E1C03749 It's the Core OS of the OFW4.82 we will use as ROS patch to overwrite wrongly applied PS3Xploit patches. 3- Overwrite both ROS of your dump with OFW4.82 CoreOS as patch: Using PS3DumpChecker (https://github.com/Swizzy/PS3DumpChecker) : - Load your dump. It may be BAD with one bad ROS hash, and maybe also the SKU and or semistatic data (PS3DumpChecker is not fully compatible with 3k and 4k dumps). Don't care as long as you are 100% confident your dump has been done correctly and checked with PyPS3checker. - In the PS3DumpChecker options (the small wrench icon at the top left) check the options as shown below. Select the custom patch file "CosOFW482.BIN" you downloaded previously then save. - Click on "Force Patch" button - You obtain a new patched dump ready to flash in your NOR. Or using PyPS3patcher (https://github.com/littlebalup/PyPS3tools/tree/master/PyPS3patcher) : - Paste the file "CosOFW482.BIN" and your dump in the script folder. - Rename "CosOFW482.BIN" as "patch.bin". - Run the script with the command: patcher.py cust yourdump - You obtain a new patched dump ready to flash in your NOR.