More actions
No edit summary |
No edit summary |
||
(14 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Infobox | {{Infobox 3DS Homebrews | ||
| title = 3DS Multi Decryptor | |title=3DS Multi Decryptor | ||
| image = | |image=3dspc.png | ||
| | |description=Decrypts and creates XORPads for game ROM files and SD card files. (Previously named 3DS CTR Decryptor) | ||
|author=Relys | |||
| lastupdated = 2015/10/19 | |lastupdated=2015/10/19 | ||
| | |type=File Operation | ||
| | |version=2015 | ||
| | |license=Mixed | ||
| | |download=https://dlhb.gamebrew.org/3dshomebrews/3ds_multi_decryptor.zip | ||
| source = https://github.com/Relys/3DS_Multi_Decryptor | |website=https://github.com/Relys/3DS_Multi_Decryptor | ||
|source=https://github.com/Relys/3DS_Multi_Decryptor | |||
}} | }} | ||
{{Obsolete}} | |||
3DS multitool | 3DS multitool/decryptor. | ||
'''Note:''' This has been ported to [[Decrypt9WIP 3DS|Decrypt9]] by Archshift for 9.x. | |||
==Building== | |||
To build for iQUE (Chinese 3DS) please change the following line in rop.py | |||
_pop_r2_pc = 0x0022952D ### for ique change to 0x00229565 | |||
Also note that you need to supply your own copy of slot0x25KeyX.bin. | |||
==User guide== | |||
===Functions=== | |||
* NCCH padgen -- Use ctrkeygen.py to generate the needed ncchinfo.bin. | |||
* SD padgen -- Use SDinfo_gen.py to generate the needed SDinfo.bin. | |||
* Title key decrypter -- Check out the scripts in 'ticket-titlekey_stuff'. | |||
* NAND FAT16 partition padgen -- Self-explanatory. | |||
* NAND dumper -- Self-explanatory. | |||
==Controls== | |||
D-Pad Up/Down - Change selection | |||
A - Select item | |||
B - Return to menu (after your selected process finishes) | |||
== | ==Media== | ||
'''Ninjhax Hack: 3DS Homebrew Exploit (Known as SSSpwn) Tutorial''' ([https://www.youtube.com/watch?v=Kev-C6m1P9o Relys]) <br> | |||
<youtube>Kev-C6m1P9o</youtube> | |||
* sbJFn5r - | ==Credits== | ||
* relys - | * sbJFn5r - Coding + initial versions of the python scripts. | ||
* xerpi - | * relys - Coding. | ||
* CaitSith2 - Updates to CDNto3DS | * xerpi - Did some refactoring early on, that was then built off of and made ugly again. | ||
* idunoe - Allow user specified moveable.sed | * CaitSith2 - Updates to CDNto3DS. | ||
* einstein95 - Padding from .rsf | * idunoe - Allow user specified moveable.sed. | ||
* einstein95 - Padding from .rsf. | |||
Thanks to: | |||
* yellows8, plutooo and everyone else that contributes to the 3dbrew wiki. | |||
* megazig for the crypto functions. | |||
* some GBAtemper for the FS functions. Don't know who you are, but was informed they came from someone on GBAtemp. | |||
* enler for finding the correct gadget offset. | |||
==External links== | |||
* Author's website - http://syler.co/blog/Ninjhax-Nintendo-3DS/ | |||
* GitHub - https://github.com/Relys/3DS_Multi_Decryptor0 | |||
* GBAtemp - https://gbatemp.net/threads/release-3ds_ctr_decryptor-void.370684/ |
Latest revision as of 13:50, 6 July 2024
3DS Multi Decryptor | |
---|---|
General | |
Author | Relys |
Type | File Operation |
Version | 2015 |
License | Mixed |
Last Updated | 2015/10/19 |
Links | |
Download | |
Website | |
Source | |
This application has been obsoleted by one or more applications that serve the same purpose, but are more stable or maintained. |
3DS multitool/decryptor.
Note: This has been ported to Decrypt9 by Archshift for 9.x.
Building
To build for iQUE (Chinese 3DS) please change the following line in rop.py
_pop_r2_pc = 0x0022952D ### for ique change to 0x00229565
Also note that you need to supply your own copy of slot0x25KeyX.bin.
User guide
Functions
- NCCH padgen -- Use ctrkeygen.py to generate the needed ncchinfo.bin.
- SD padgen -- Use SDinfo_gen.py to generate the needed SDinfo.bin.
- Title key decrypter -- Check out the scripts in 'ticket-titlekey_stuff'.
- NAND FAT16 partition padgen -- Self-explanatory.
- NAND dumper -- Self-explanatory.
Controls
D-Pad Up/Down - Change selection
A - Select item
B - Return to menu (after your selected process finishes)
Media
Ninjhax Hack: 3DS Homebrew Exploit (Known as SSSpwn) Tutorial (Relys)
Credits
- sbJFn5r - Coding + initial versions of the python scripts.
- relys - Coding.
- xerpi - Did some refactoring early on, that was then built off of and made ugly again.
- CaitSith2 - Updates to CDNto3DS.
- idunoe - Allow user specified moveable.sed.
- einstein95 - Padding from .rsf.
Thanks to:
- yellows8, plutooo and everyone else that contributes to the 3dbrew wiki.
- megazig for the crypto functions.
- some GBAtemper for the FS functions. Don't know who you are, but was informed they came from someone on GBAtemp.
- enler for finding the correct gadget offset.
External links
- Author's website - http://syler.co/blog/Ninjhax-Nintendo-3DS/
- GitHub - https://github.com/Relys/3DS_Multi_Decryptor0
- GBAtemp - https://gbatemp.net/threads/release-3ds_ctr_decryptor-void.370684/