I dont find the two other files.decrypt9 and sdpadgen with sdinfo.bin at the root of your sd card
Could you elaborate on how you generate said files?decrypt9 and sdpadgen with sdinfo.bin at the root of your sd card
python FunkyCIA2.py ticket_emu.db -title 0004000000182300
G:\Nintendo 3DS\0537bed45e5fa36fb6427f70c2ef5a47\d61400f547802878534c313600035344
padxorer.exe FILENAME.app XORPADNAME.xorpad
Install the Demo in your EmuNand (by dowloading from eShop).
Use Decrypt9, go in EmuNand Tool (not the windows tool, it's in D9), dump the tickets.
Dowload FunkyCIA2. Put the tickets_emu.db here.
Open a CMD here and write:
Wait. Go in the cia folder, and take 0004000000182300.cia.Code:python FunkyCIA2.py ticket_emu.db -title 0004000000182300
.
I think that is in the nand; so dump the nand, decrypt the fat16 partition, mount the image, then find movable.sed.I get nothing when i do the command (also my .cia is not downloaded from eshop)
Edit: I found another of your tutorial to decrypt cia but i need /movable.sed for use decrypt9
I don't think that will work because the Triforce Heroes demo uses seeddb so the decryption process is slightly different.I get nothing when i do the command (also my .cia is not downloaded from eshop)
Edit: I found another of your tutorial to decrypt cia but i need /movable.sed for use decrypt9
Yep it's in the nand, and you don't really need to do it that way anymore (unless you want to), Decrypt9 can directly dump moveable.sed from the 3ds (in d0k3's version at least, in my version soon too once i figure out and fix some bugs).I think that is in the nand; so dump the nand, decrypt the fat16 partition, mount the image, then find movable.sed.
I don't think that will work because the Triforce Heroes demo uses seeddb so the decryption process is slightly different.