Separate names with a comma.
Discussion in '3DS - ROM Hacking, Translations and Utilities' started by HikkiFan7, Nov 29, 2015.
Is there any way to decrypt a CIA and extract the romfs without a <9.2 3DS?
Yes , but you can't use it on your 3ds , get @Asia81's Pack Hack (3.6 is less glitched imo) Shift+Right Click -> Open a command here (?)* and copy this :
Warning: Spoilers inside!
ctrtool --contents=contents NAME OF THE CIA.cia
ctrtool -p --exefs=exefs.bin contents.0000.00000000
ctrtool -t exefs --exefsdir=exefs --decompresscode exefs.bin
ctrtool -p --romfs=romfs.bin contents.0000.00000000
then right click on the command prompt
EDIT : Press Enter sometimes if it's "stuck".
So i tried this with a system title for giggles (and because I have been looking for a way to do this with a system title to attempt something for a while) and while the first line runs, the second spits an error because contents.0000.00000000 does not exist. The first line actually created two files, contents.0000.00000066 and contents.0001.00000067.
Do I need to run the exefs and romfs lines for both contents files?
I have no clue , i never tried system apps :/
Darn. Really hoping I found the solution. Worth noting maybe that running the second, third and fourth lines on content.0000.00000066 works.
Trying it on content.0001.00000067 generates a null size exefs.bin, and a romfs.bin that is about 4 KB smaller than the content file. Also, the combine sizes of the romfs and exefs files from the first content file is about 13 KB smaller than the content file that was used to generate them.
When using ctrtool to extract I get an error "exheader hash mismatch"
send me your cia, will try
for decrypted cia, u can extract romfs easily, but if the cia is encrypted, then you need decrypt9 which require <=9.2