Does this site even work?I need to find how to edit the UID - You can write to an amiibo or tag by using AmiiWrite.
http://amiibo.codlab.eu/amiibo.apk
Does this site even work?I need to find how to edit the UID - You can write to an amiibo or tag by using AmiiWrite.
http://amiibo.codlab.eu/amiibo.apk
That link doesn't work, just gives me a timeout.
That link doesn't work, just gives me a timeout.
And download the android SDK?@pokasmax posted it here: https://gbatemp.net/threads/save-and-restore-your-amiibos-on-android.403072/
You can clone the repo and compile it yourself: https://github.com/codlab/amiibo
Why not just use Mifare++ Ultralight? That's what I use for all my reading, editing, and writing.And download the android SDK?
Nah, better wait for the site to come back...![]()
oorrr just use his online thing.You're trying to encrypt and decrypt, aren't you? Get an API key from the guy and use amiicli.sh![]()
Thank you very much, you just released the last key needed (well, the xorpads). I couldn't find any documentation about how they work, so I couldn't calculate them with the keys. Now I only have to find the way to use the keys and the xorpad with amiibo-toolsSet1 keys:
1st 3 are DEVs data (and they are all correct).
2nd 3 are DEVs data and HMAC key is 830E75...
Set2 keys:
1st 3 are retail data and HMAC key is 1D164B...
2nd 3 are retail data and HMAC key is 7F752D...
As stated, algo for xorpad: AES-128 CTR mode: 1st key is AES KeyY, 2nd key is AES IV.
Resulting xorpads are:
495B197A5B802055AEE8AE8EA08E053233C770A8A99E6DAD6F1CA01FE3618022 (for DEVs)
044917DC76B49640D6F83939960FAED4EF392FAAB21428AA21FB54E545054766 (for retail)
xorpads ARE NOT copyrighted materials... they are just... xorpads, so no reason to censor them
Everything started from this great job.
Set1 keys:
1st 3 are DEVs data (and they are all correct).
2nd 3 are DEVs data and HMAC key is 830E75...
Set2 keys:
1st 3 are retail data and HMAC key is 1D164B...
2nd 3 are retail data and HMAC key is 7F752D...
As stated, algo for xorpad: AES-128 CTR mode: 1st key is AES KeyY, 2nd key is AES IV.
Resulting xorpads are:
495B197A5B802055AEE8AE8EA08E053233C770A8A99E6DAD6F1CA01FE3618022 (for DEVs)
044917DC76B49640D6F83939960FAED4EF392FAAB21428AA21FB54E545054766 (for retail)
xorpads ARE NOT copyrighted materials... they are just... xorpads, so no reason to censor them
Everything started from this great job.
lol, I figured. I was curious on how you interacted with the AES module. Did you use decrypt9 somehow, or something else?Maybe using a 3ds ?![]()
Your keyfile is correct?Could someone help out please?
I have created a.bin file of Mario using amiiqo.
I have successfully run it through the online decrypt-er and I am able to read the contents of the file.
What I am trying to do is use the amiitool to do the same decrypting. I have a binary keys file 80 bytes in length using the info I have found here, however amiitool says simply says
"!!! WARNING !!!: Tag signature was NOT valid".
Any idea what I am doing wrong?