Working on reverse engineering the CFW client interface, I'm about 75% done. Should be able to release the list of commands within 24hrs.
Working on reverse engineering the CFW client interface, I'm about 75% done. Should be able to release the list of commands within 24hrs.
11usr= (Not sure about this one, would have to look at objdump)
--key=
--keyY=
--keyslot=
--ctr=
--iv=
--input=
--ctrcrypt
--cbcdecrypt
--cbcencrypt
--serveradr=
--outpath=
--customcmd=
Ah ok lol, thanks for the reply. I got worried for a secThat's normal, it'll be visible but you won't be able to interact with it.
You won't see it if you separate you sysnand from your rednand.Uhh just curious, is it normal if you see the devmenu on your system Nand? I restarted the system and I see it hiding in the corner.
How would you go about separating the two? That sounds a lot safer then having the two interact with each other.You won't see it if you separate you sysnand from your rednand.
what do i do when i get the teal screen black then flashes white after that it will boot me back in to the home menu normally without any errors.
i click on run.bat when i run the exploit and it says failed to connect. i know i got the correct 3ds IP and my computer and 3ds are using the same router.
i tried a wired connection on my computer but still the same i know im close i can feel it. xD lol
You have to format either the sysnand or the rednand.How would you go about separating the two? That sounds a lot safer then having the two interact with each other.
is says waiting for ACK in the run.bat cmd right now what does that mean,?
Use this for arm9_code.bin.I found a trick to ensure 100% success in launching the CFW.
Also I'm going to attempt to release a working open source version of the CFW.
boot.bin and arm11_code.bin have important parts.I thought the problem was in ARM11?
boot.bin and arm11_code.bin have important parts.
So I don't want him to waste time to reverse arm9_code.bin.