diff --git a/_pages/en_US/dumping-movable-(nimhax).txt b/_pages/en_US/dumping-movable-(nimhax).txt
new file mode 100644
index 0000000000..619100b7de
--- /dev/null
+++ b/_pages/en_US/dumping-movable-(nimhax).txt
@@ -0,0 +1,44 @@
+---
+title: "Dumping Movable (nimhax)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+
+To install boot9strap on your device, we derive your device's unique encryption key. To accomplish this, we use a tool called nimhax (along with another exploit to run nimhax) to dump the data encryption key (movable.sed) from your device.
+
+For a more technical explanation, see [here](https://github.com/luigoalma/nimhax/) for information about the nimhax exploit.
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+### What You Need
+
+* The latest release of [nimhax](https://github.com/luigoalma/nimhax/releases/latest) (the nimhax `.zip` file)
+
+### Instructions
+
+#### Section I - Prep Work
+
+1. Power off your device
+1. Insert your SD card into your computer
+1. Create a folder named `3ds` on the root of your SD card, if it does not already exist
+1. Copy the `nimhax` folder from your nimhax `.zip` to the `/3ds/` folder on your SD card
+1. Reinsert your SD card into your device
+1. Power on your device
+
+#### Section II - nimhax
+
+1. Open the Homebrew Launcher through your method of choice (likely the Internet Browser)
+1. Launch nimhax from the list of homebrew
+1. If the exploit was successful, a `movable.sed` file will be available on the root of your SD card.
+
+### Next step: BannerBomb3
+
+Once you have your device's encryption key (`movable.sed`), you will use it in conjunction with BannerBomb3, which uses your `movable.sed` file to take advantage of exploits in the System Settings application.
+
+Continue to [BannerBomb3](bannerbomb3)
+{: .notice--primary}
diff --git a/_pages/en_US/homebrew-launcher-(super-skaterhax).txt b/_pages/en_US/homebrew-launcher-(super-skaterhax).txt
new file mode 100644
index 0000000000..1ba4c61ae2
--- /dev/null
+++ b/_pages/en_US/homebrew-launcher-(super-skaterhax).txt
@@ -0,0 +1,71 @@
+---
+title: "Installing boot9strap (SSLoth-Browser)"
+---
+
+{% include toc title="Table of Contents" %}
+
+{% capture technical_info %}
+Technical Details (optional)
+For technical details on the exploits that you will be using on this page, see [here](https://github.com/zoogie/super-skaterhax).
+
+{% endcapture %}
+{{ technical_info | markdownify }}
+{: .notice--info}
+
+### Compatibility Notes
+
+Super-skaterhax (when combined with unSAFE_MODE) is compatible with versions 11.15.0 through 11.16.0 in all regions.
+
+The instructions provided only apply to the New 3DS, New 3DS XL, and New 2DS XL. Please ensure that the device you are modding is a New 3DS, New 3DS XL, or New 2DS XL before continuing.
+{: .notice--warning}
+
+### What You Need
+
+* The latest release of [Luma3DS](https://github.com/LumaTeam/Luma3DS/releases/latest) (the Luma3DS `.zip` file)
+* The latest release of [super-skaterhax](https://github.com/zoogie/super-skaterhax/releases) (the release `.zip` file)
+* The latest release of [unSAFE_MODE](https://github.com/zoogie/unSAFE_MODE/releases/latest) (the RELEASE `.zip` file)
+
+#### Section I - Prep Work
+
+In this section, you will copy the files needed to trigger both browserhax and the Homebrew Launcher.
+
+1. Power off your device
+1. Insert your SD card into your computer
+1. Copy `boot.firm` and `boot.3dsx` from the Luma3DS `.zip` to the root of your SD card
+ + The root of the SD card refers to the initial directory on your SD card where you can see the Nintendo 3DS folder, but are not inside of it
+1. Copy all files inside the folder for your device's region in the super-skaterhax `.zip` to the root of your SD card
+1. Create a folder named `3ds` on the root of your SD card
+1. Copy the `slotTool` folder from the unSAFE_MODE `.zip` to the `3ds` folder on your SD card
+1. Reinsert your SD card into your device
+1. Power on your device
+
+#### Section II - super-skaterhax
+
+In this section, you will visit the browser exploit webpage, which will launch the Homebrew Launcher.
+
+If you haven't already, make sure you have a working Internet connection set up on your device.
+{: .notice--info}
+
+1. On the HOME Menu, press the Left and Right shoulder buttons together to open the camera
+ + If you are unable to open the camera, open the Internet Browser and manually type the URL instead (`https://zoogie.github.io/web/nbhax/`)
+1. Tap the QR code button and scan one of the following QR codes for your device's region [here](https://user-images.githubusercontent.com/28328903/226086338-585bfdac-0aac-44c0-b413-89206d2815d8.png)
+ + If you get an error, [follow this troubleshooting guide](troubleshooting#installing-boot9strap-ssloth-browser)
+ + If you get a security certificate warning, press (A) to allow the connection
+1. Press the (Select) button to open the bookmark tab
+ + If your (Select) button does not respond, tap the star icon on the bottom-left corner of the screen
+1. Tap "Bookmark this page"
+1. Press (B) once to return to the browser
+1. Press (Start) to open the context menu
+ + If your (Start) button does not respond, tap the 3-line menu on the bottom-right corner of the screen
+1. Tap on "Settings"
+1. Tap on "Delete Cookies"
+1. Press (A) to continue
+1. Press (Home) to return to the HOME Menu, then immediately press (A) to launch the browser again
+1. Select the "GO GO!" button on the top screen
+ + If any prompts appear, approve all of them
+1. If the exploit was successful, your device will have booted into the Homebrew Launcher
+
+___
+
+### Continue to [Installing boot9strap (HBL-USM)](installing-boot9strap-(hbl-usm))
+{: .notice--primary}