How did you get it working dude? was you getting similar issues to me by any chance? I keep getting result code: c8a0802b. also do you just put 2 data base files and name them import.db and title.db is that correct?
Hello,I can get the romfs.bin,exheader.bin,exefs.bin by decrypting the 3ds rom,but where's the code.bin,icon.bin and banner.bin come from?Step1: decrypt the .3ds rom.
I will not explain it in this tutorial, as it is explained a couple of times around the forum. (http://gbatemp.net/threads/release-3ds_ctr_decryptor-void.370684/)
If you end up with a decrypted romfs.bin, exheader.bin, code.bin (decompressed), icon.bin and banner.bin you did everything correct.
Hello,I can get the romfs.bin,exheader.bin,exefs.bin by decrypting the 3ds rom,but where's the code.bin,icon.bin and banner.bin come from?
ctrtool -t exefs --exefsdir=exefs exefs.bin --decompresscode
It was built with SDK 5.x, so probably!
I tried again with -desc app:3 -target t and it worked.
Thank you ,thank you very muchCode:ctrtool -t exefs --exefsdir=exefs exefs.bin --decompresscode
Thanks a lot, it's worked for with with MK7
Tip : If you want to add the game manual (if the game have one) you can extract it with rom_tool -x then add -content XXX-X-XXXX_1_MANUAL.cfa:1:1 to the makerom command
well if you can create a manual i dont see why not.....idk what format the manual is in thoughwould this mean that we can add other documents such as game guides if they were in the same format as the game manuals?.......................sudeki300
You'll have to create the dbs folder.
but... it didn't workCode:ctrtool -t exefs --exefsdir=exefs exefs.bin --decompresscode
well it is installed to your sd card. and actually someone tried flashing their emunand to realnand. it boots but the devmenu wont work. this is logical as it the exploit is needed to bypass some checksmaybe someone has said this already, but, from what i understand, the dev menu is installed to an emunand... right?
has anyone tried flashing that emunand to their nand, to make it an easier process, so you don't need to load up the emunand each time you want to install something?
well it is installed to your sd card. and actually someone tried flashing their emunand to realnand. it boots but the devmenu wont work. this is logical as it the exploit is needed to bypass some checks
seems like a faulty ncchinfo.bin, maybe to remake it will help. (or if jsut the index number is wrong, open it with a hex editor and change te first byte from 00 to ?, where ? is the amount of xorpads you want to generate)Hi there guays!
First of all thank you so much to all sceners and users that works for the comunity.
Here is the question:
-I want to convert .3ds to .cia,I drop the .3ds file in ctrkeygen.py and a 1kb ncchinfo.bin was generated.I paste this into root of sd card,and when I launch the exploit,I recived this:
''Nothing to do:-1''
Where is the fail?
Thank you so much guys
You can have a try,but I think it wouldn't workmaybe someone has said this already, but, from what i understand, the dev menu is installed to an emunand... right?
has anyone tried flashing that emunand to their nand, to make it an easier process, so you don't need to load up the emunand each time you want to install something?
yeah, someone already tried and it didn't work. I guess the system processes are patched in RAM instead of the actual files.maybe someone has said this already, but, from what i understand, the dev menu is installed to an emunand... right?
has anyone tried flashing that emunand to their nand, to make it an easier process, so you don't need to load up the emunand each time you want to install something?