Does this site even work?I need to find how to edit the UID - You can write to an amiibo or tag by using AmiiWrite.
http://amiibo.codlab.eu/amiibo.apk
Does this site even work?I need to find how to edit the UID - You can write to an amiibo or tag by using AmiiWrite.
http://amiibo.codlab.eu/amiibo.apk
That link doesn't work, just gives me a timeout.
That link doesn't work, just gives me a timeout.
And download the android SDK?@pokasmax posted it here: https://gbatemp.net/threads/save-and-restore-your-amiibos-on-android.403072/
You can clone the repo and compile it yourself: https://github.com/codlab/amiibo
Why not just use Mifare++ Ultralight? That's what I use for all my reading, editing, and writing.And download the android SDK?
Nah, better wait for the site to come back...
oorrr just use his online thing.You're trying to encrypt and decrypt, aren't you? Get an API key from the guy and use amiicli.sh
Thank you very much, you just released the last key needed (well, the xorpads). I couldn't find any documentation about how they work, so I couldn't calculate them with the keys. Now I only have to find the way to use the keys and the xorpad with amiibo-toolsSet1 keys:
1st 3 are DEVs data (and they are all correct).
2nd 3 are DEVs data and HMAC key is 830E75...
Set2 keys:
1st 3 are retail data and HMAC key is 1D164B...
2nd 3 are retail data and HMAC key is 7F752D...
As stated, algo for xorpad: AES-128 CTR mode: 1st key is AES KeyY, 2nd key is AES IV.
Resulting xorpads are:
495B197A5B802055AEE8AE8EA08E053233C770A8A99E6DAD6F1CA01FE3618022 (for DEVs)
044917DC76B49640D6F83939960FAED4EF392FAAB21428AA21FB54E545054766 (for retail)
xorpads ARE NOT copyrighted materials... they are just... xorpads, so no reason to censor them
Everything started from this great job.
Set1 keys:
1st 3 are DEVs data (and they are all correct).
2nd 3 are DEVs data and HMAC key is 830E75...
Set2 keys:
1st 3 are retail data and HMAC key is 1D164B...
2nd 3 are retail data and HMAC key is 7F752D...
As stated, algo for xorpad: AES-128 CTR mode: 1st key is AES KeyY, 2nd key is AES IV.
Resulting xorpads are:
495B197A5B802055AEE8AE8EA08E053233C770A8A99E6DAD6F1CA01FE3618022 (for DEVs)
044917DC76B49640D6F83939960FAED4EF392FAAB21428AA21FB54E545054766 (for retail)
xorpads ARE NOT copyrighted materials... they are just... xorpads, so no reason to censor them
Everything started from this great job.
lol, I figured. I was curious on how you interacted with the AES module. Did you use decrypt9 somehow, or something else?Maybe using a 3ds ?
Your keyfile is correct?Could someone help out please?
I have created a.bin file of Mario using amiiqo.
I have successfully run it through the online decrypt-er and I am able to read the contents of the file.
What I am trying to do is use the amiitool to do the same decrypting. I have a binary keys file 80 bytes in length using the info I have found here, however amiitool says simply says
"!!! WARNING !!!: Tag signature was NOT valid".
Any idea what I am doing wrong?