Basically you have to get the d file from your NAND, and to do that you have to dump your NAND, get the xorpads for that, extract the FAT16 partition, decrypt it, mount it, and get that file. Otherwise there's an extra step you've gotta do. ![]() If you do make a new SD for this though, do not unlink it from sysNAND. Then you have to actually compile the 3DS_Multi_Decryptor (their current build isn't up to date on their Github), put the d on your SD card, and then generate the xorpads from your SDinfo.bin This also works for updates as well if you want that. app you just decrypted, get those xorpads, and then decrypt that into the raw romfs/exefs/exheader. app, and from there you can run the ctrKeyGen.py on the. cia, run SDinfo_gen.py from the Multi Decryptor tool set (I usually do this on a separate SD emuNAND card because decrypting everything on your SD takes as much space as is already on the SD card itself), get all the pads, find the title for Flipnote Studio 3D (00040000000C6600), run the xorpads onto the. ![]() I believe you can decrypt it from the SD card instead actually, not sure if anything exists atm for.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |