I only have his otp boot9 and boot11You can't unless you have the xorpads from the nand as well as the dumped bootrom. Even if you have those I'm not personally aware of the process but I know it can be done if you have everything. There is more than likely some CMD program that can do this, or a private program somewhere. This isn't the first time this has been asked.....
I'm not 100% sure if the otp is enough to decrypt the file without the xorpads, in theory it should be but someone with more experience in 3DS assembly would be able to give you a better detailed explanation; or possibly a working solution. I just know, that if you have the necessary files it CAN be decrypted on the PC and explored, I'm just not sure exactly HOW...I only have his otp boot9 and boot11
I'm not 100% sure if the otp is enough to decrypt the file without the xorpads, in theory it should be but someone with more experience in 3DS assembly would be able to give you a better detailed explanation; or possibly a working solution. I just know, that if you have the necessary files it CAN be decrypted on the PC and explored, I'm just not sure exactly HOW...
you could just find it in godmode9 on the actual hardwareHello ! I have a nand.bin on my computer and I want to explore it to take somes files. How can I explore it ?
I want to take the local friend code seed
I have the backup but no the 3dsyou could just find it in godmode9 on the actual hardware
I can extract the files I want with it?xorpads are just junk files generated using keys, they are not needed if you have the keys.
with an otp+bootrom dump you can generate the nand keys and decrypt it with openssl, there is a bash script on yellow8's github to do this (google: yellows8/boot9_tools).
Was about to suggest that. I never used it myself but it should do exactly what OP wants.